CVE-2017-5982

NameCVE-2017-5982
DescriptionDirectory traversal vulnerability in the Chorus2 2.4.2 add-on for Kodi allows remote attackers to read arbitrary files via a %2E%2E%252e (encoded dot dot slash) in the image path, as demonstrated by image/image%3A%2F%2F%2e%2e%252fetc%252fpasswd.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-3712-1
Debian Bugs855225, 861274

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
kodi (PTS)bullseye2:19.1+dfsg2-2+deb11u1fixed
bookworm2:20.1+dfsg-1fixed
sid, trixie2:21.1+dfsg-5fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
kodisourcebuster2:17.6+dfsg1-4+deb10u1DLA-3712-1
kodisource(unstable)2:18.6+dfsg1-1855225
xbmcsource(unstable)(unfixed)861274

Notes

[stretch] - kodi <ignored> (Minor issue)
[jessie] - kodi <ignored> (Minor issue)
[jessie] - xbmc <ignored> (Minor issue)
[wheezy] - xbmc <ignored> (Minor issue)
http://seclists.org/fulldisclosure/2017/Feb/27
http://trac.kodi.tv/ticket/17314
https://lists.debian.org/debian-lts/2017/04/msg00025.html
https://lists.debian.org/debian-lts/2017/04/msg00055.html (and followups)
https://lists.debian.org/debian-lts/2017/05/msg00006.html

Search for package or bug name: Reporting problems