Directory traversal vulnerability in the Chorus2 2.4.2 add-on for Kodi allows remote attackers to read arbitrary files via a %2E%2E%252e (encoded dot dot slash) in the image path, as demonstrated by image/image%3A%2F%2F%2e%2e%252fetc%252fpasswd.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_name": "kodi", "binary_version": "2:18.6+dfsg1-2ubuntu1" }, { "binary_name": "kodi-addons-dev", "binary_version": "2:18.6+dfsg1-2ubuntu1" }, { "binary_name": "kodi-bin", "binary_version": "2:18.6+dfsg1-2ubuntu1" }, { "binary_name": "kodi-bin-dbgsym", "binary_version": "2:18.6+dfsg1-2ubuntu1" }, { "binary_name": "kodi-data", "binary_version": "2:18.6+dfsg1-2ubuntu1" }, { "binary_name": "kodi-eventclients-common", "binary_version": "2:18.6+dfsg1-2ubuntu1" }, { "binary_name": "kodi-eventclients-dev", "binary_version": "2:18.6+dfsg1-2ubuntu1" }, { "binary_name": "kodi-eventclients-kodi-send", "binary_version": "2:18.6+dfsg1-2ubuntu1" }, { "binary_name": "kodi-eventclients-ps3", "binary_version": "2:18.6+dfsg1-2ubuntu1" }, { "binary_name": "kodi-eventclients-wiiremote", "binary_version": "2:18.6+dfsg1-2ubuntu1" }, { "binary_name": "kodi-eventclients-wiiremote-dbgsym", "binary_version": "2:18.6+dfsg1-2ubuntu1" }, { "binary_name": "kodi-gbm", "binary_version": "2:18.6+dfsg1-2ubuntu1" }, { "binary_name": "kodi-gbm-dbgsym", "binary_version": "2:18.6+dfsg1-2ubuntu1" }, { "binary_name": "kodi-repository-kodi", "binary_version": "2:18.6+dfsg1-2ubuntu1" }, { "binary_name": "kodi-wayland", "binary_version": "2:18.6+dfsg1-2ubuntu1" }, { "binary_name": "kodi-wayland-dbgsym", "binary_version": "2:18.6+dfsg1-2ubuntu1" }, { "binary_name": "kodi-x11", "binary_version": "2:18.6+dfsg1-2ubuntu1" }, { "binary_name": "kodi-x11-dbgsym", "binary_version": "2:18.6+dfsg1-2ubuntu1" } ] }