CVE-2023-48702
CVSS V2 None
CVSS V3 None
Description
Jellyfin is a system for managing and streaming media. Prior to version 10.8.13, the `/System/MediaEncoder/Path` endpoint executes an arbitrary file using `ProcessStartInfo` via the `ValidateVersion` function. A malicious administrator can setup a network share and supply a UNC path to `/System/MediaEncoder/Path` which points to an executable on the network share, causing Jellyfin server to run the executable in the local context. The endpoint was removed in version 10.8.13.
Overview
- CVE ID
- CVE-2023-48702
- Assigner
- GitHub_M
- Vulnerability Status
- PUBLISHED
- Published Version
- 2023-12-13T20:53:28.786Z
- Last Modified Date
- 2023-12-13T20:53:28.786Z
Weakness Enumerations
References
Reference URL | Reference Tags |
---|---|
https://securitylab.github.com/advisories/GHSL-2023-028_jellyfin/ | x_refsource_CONFIRM |
https://github.com/jellyfin/jellyfin/security/advisories/GHSA-rr9h-w522-cvmr | x_refsource_MISC |
https://github.com/jellyfin/jellyfin/commit/83d2c69516471e2db72d9273c6a04247d0f37c86 | x_refsource_MISC |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2023-48702 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48702 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2024-06-25 00:14:46 | Added to TrackCVE |