Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1xd3AzLTVmdzMtNXdnds4AAuWw
Incorrect Access Control and Cross Site Scripting in Jellyfin
In Jellyfin before 10.8, the /users endpoint has incorrect access control for admin functionality. This lack of access control can be leveraged to performe a cross site scripting attack.
Permalink: https://github.com/advisories/GHSA-qwp3-5fw3-5wgvJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1xd3AzLTVmdzMtNXdnds4AAuWw
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: over 2 years ago
Updated: almost 2 years ago
CVSS Score: 8.8
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Identifiers: GHSA-qwp3-5fw3-5wgv, CVE-2022-35909
References:
- https://nvd.nist.gov/vuln/detail/CVE-2022-35909
- https://github.com/jellyfin/jellyfin/pull/7569/files
- https://docs.google.com/document/d/1cBXQrokCvWxKET4BKi3ZLtVp5gst6-MrGPgMKpfXw8Y/edit
- https://medium.com/stolabs/cve-2022-35909-cve-2022-35910-incorrect-access-control-and-xss-stored-to-jellyfin-967359c91058
- https://github.com/advisories/GHSA-qwp3-5fw3-5wgv
Blast Radius: 1.0
Affected Packages
nuget:Jellyfin.Common
Dependent packages: 2Dependent repositories: 0
Downloads: 121,982 total
Affected Version Ranges: < 10.8.0
Fixed in: 10.8.0
All affected versions: 10.0.1, 10.1.0, 10.2.0, 10.3.0, 10.3.5, 10.3.6, 10.3.7, 10.4.0, 10.4.1, 10.4.2, 10.4.3, 10.5.0, 10.5.2, 10.5.3, 10.5.4, 10.5.5, 10.6.0, 10.7.0, 10.7.1, 10.7.2, 10.7.3, 10.7.4, 10.7.5, 10.7.6, 10.7.7
All unaffected versions: 10.8.0, 10.8.1, 10.8.2, 10.8.3, 10.8.4, 10.8.11, 10.8.12, 10.8.13, 10.9.0, 10.9.1, 10.9.2, 10.9.3, 10.9.4, 10.9.5, 10.9.6, 10.9.7, 10.9.9, 10.9.10, 10.9.11, 10.10.0, 10.10.1, 10.10.2, 10.10.3