Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS1xd3AzLTVmdzMtNXdnds4AAuWw

Incorrect Access Control and Cross Site Scripting in Jellyfin

In Jellyfin before 10.8, the /users endpoint has incorrect access control for admin functionality. This lack of access control can be leveraged to performe a cross site scripting attack.

Permalink: https://github.com/advisories/GHSA-qwp3-5fw3-5wgv
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1xd3AzLTVmdzMtNXdnds4AAuWw
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: over 2 years ago
Updated: almost 2 years ago


CVSS Score: 8.8
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Identifiers: GHSA-qwp3-5fw3-5wgv, CVE-2022-35909
References: Repository: https://github.com/jellyfin/jellyfin
Blast Radius: 1.0

Affected Packages

nuget:Jellyfin.Common
Dependent packages: 2
Dependent repositories: 0
Downloads: 121,982 total
Affected Version Ranges: < 10.8.0
Fixed in: 10.8.0
All affected versions: 10.0.1, 10.1.0, 10.2.0, 10.3.0, 10.3.5, 10.3.6, 10.3.7, 10.4.0, 10.4.1, 10.4.2, 10.4.3, 10.5.0, 10.5.2, 10.5.3, 10.5.4, 10.5.5, 10.6.0, 10.7.0, 10.7.1, 10.7.2, 10.7.3, 10.7.4, 10.7.5, 10.7.6, 10.7.7
All unaffected versions: 10.8.0, 10.8.1, 10.8.2, 10.8.3, 10.8.4, 10.8.11, 10.8.12, 10.8.13, 10.9.0, 10.9.1, 10.9.2, 10.9.3, 10.9.4, 10.9.5, 10.9.6, 10.9.7, 10.9.9, 10.9.10, 10.9.11, 10.10.0, 10.10.1, 10.10.2, 10.10.3