Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-1255 | Jellyfin is a free-software media system. Versions starting with 10.8.0 and prior to 10.8.10 and prior have a directory traversal vulnerability inside the `ClientLogController`, specifically `/ClientLog/Document`. When combined with a cross-site scripting vulnerability (CVE-2023-30627), this can result in file write and arbitrary code execution. Version 10.8.10 has a patch for this issue. There are no known workarounds. |
Github GHSA |
GHSA-9p5f-5x8v-x65m | Directory traversal + file write causing arbitrary code execution |
Wed, 12 Feb 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-02-12T16:34:36.816Z
Reserved: 2023-04-13T13:25:18.833Z
Link: CVE-2023-30626
Updated: 2024-08-02T14:28:52.037Z
Status : Modified
Published: 2023-04-24T21:15:09.687
Modified: 2024-11-21T08:00:32.410
Link: CVE-2023-30626
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA