mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
68 lines
2.7 KiB
JSON
68 lines
2.7 KiB
JSON
{
|
|
"id": "CVE-2025-24960",
|
|
"sourceIdentifier": "security-advisories@github.com",
|
|
"published": "2025-02-03T21:15:16.020",
|
|
"lastModified": "2025-02-03T21:15:16.020",
|
|
"vulnStatus": "Awaiting Analysis",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Jellystat is a free and open source Statistics App for Jellyfin. In affected versions Jellystat is directly using a user input in the route(s). This can lead to Path Traversal Vulnerabilities. Since this functionality is only for admin(s), there is very little scope for abuse. However, the `DELETE` `files/:filename` can be used to delete any file. This issue has been addressed in version 1.1.3. Users are advised to upgrade. There are no known workarounds for this vulnerability."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Jellystat es una aplicaci\u00f3n de estad\u00edsticas de c\u00f3digo abierto y gratuita para Jellyfin. En las versiones afectadas, Jellystat utiliza directamente la entrada del usuario en las rutas. Esto puede provocar vulnerabilidades Path Traversal. Dado que esta funcionalidad es solo para administradores, hay muy poco margen para el abuso. Sin embargo, el comando `DELETE` `files/:filename` se puede utilizar para eliminar cualquier archivo. Este problema se ha solucionado en la versi\u00f3n 1.1.3. Se recomienda a los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "security-advisories@github.com",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N",
|
|
"baseScore": 8.7,
|
|
"baseSeverity": "HIGH",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "HIGH",
|
|
"userInteraction": "NONE",
|
|
"scope": "CHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "NONE"
|
|
},
|
|
"exploitabilityScore": 2.3,
|
|
"impactScore": 5.8
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "security-advisories@github.com",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-22"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://cwe.mitre.org/data/definitions/22.html",
|
|
"source": "security-advisories@github.com"
|
|
},
|
|
{
|
|
"url": "https://github.com/CyferShepard/Jellystat/pull/303",
|
|
"source": "security-advisories@github.com"
|
|
},
|
|
{
|
|
"url": "https://github.com/CyferShepard/Jellystat/security/advisories/GHSA-6x46-6w9f-ffv6",
|
|
"source": "security-advisories@github.com"
|
|
}
|
|
]
|
|
} |