CVE-2017-5982

NameCVE-2017-5982
DescriptionDirectory traversal vulnerability in the Chorus2 2.4.2 add-on for Kodi allows remote attackers to read arbitrary files via a %2E%2E%252e (encoded dot dot slash) in the image path, as demonstrated by image/image%3A%2F%2F%2e%2e%252fetc%252fpasswd.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, GitHub code/issues, web search, more)
NVD severitymedium (attack range: remote)
Debian Bugs855225, 861274

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
kodi (PTS)stretch2:17.1+dfsg1-3vulnerable
sid2:17.3+dfsg1-5vulnerable
xbmc (PTS)wheezy2:11.0~git20120510.82388d5-1vulnerable
jessie2:13.2+dfsg1-4vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
kodisource(unstable)(unfixed)medium855225
xbmcsource(unstable)(unfixed)medium861274

Notes

[stretch] - kodi <ignored> (Minor issue)
[jessie] - kodi <ignored> (Minor issue)
[jessie] - xbmc <ignored> (Minor issue)
[wheezy] - xbmc <ignored> (Minor issue)
http://seclists.org/fulldisclosure/2017/Feb/27
http://trac.kodi.tv/ticket/17314
https://lists.debian.org/debian-lts/2017/04/msg00025.html
https://lists.debian.org/debian-lts/2017/04/msg00055.html (and followups)
https://lists.debian.org/debian-lts/2017/05/msg00006.html

Search for package or bug name: Reporting problems