CVE-2024-31220

Source
https://cve.org/CVERecord?id=CVE-2024-31220
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-31220.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-31220
Aliases
  • GHSA-6rg7-7m3w-w5wc
Published
2024-04-05T14:59:52.662Z
Modified
2026-04-02T10:10:21.072669Z
Severity
  • 7.3 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L CVSS Calculator
Summary
Sunshine vulnerable to remote unauthenticated arbitrary file read
Details

Sunshine is a self-hosted game stream host for Moonlight. Starting in version 0.16.0 and prior to version 0.18.0, an attacker may be able to remotely read arbitrary files without authentication due to a path traversal vulnerability. Users who exposed the Sunshine configuration web user interface outside of localhost may be affected, depending on firewall configuration. To exploit vulnerability, attacker could make an http/s request to the node_modules endpoint if user exposed Sunshine config web server to internet or attacker is on the LAN. Version 0.18.0 contains a patch for this issue. As a workaround, one may block access to Sunshine via firewall.

Database specific
{
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/31xxx/CVE-2024-31220.json",
    "cwe_ids": [
        "CWE-22"
    ]
}
References

Affected packages

Git / github.com/lizardbyte/sunshine

Affected ranges

Type
GIT
Repo
https://github.com/lizardbyte/sunshine
Events

Affected versions

v0.*
v0.16.0
v0.17.0

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-31220.json"