CVE-2017-5982

EUVD-2017-15051
Directory traversal vulnerability in the Chorus2 2.4.2 add-on for Kodi allows remote attackers to read arbitrary files via a %2E%2E%252e (encoded dot dot slash) in the image path, as demonstrated by image/image%3A%2F%2F%2e%2e%252fetc%252fpasswd.
Path Traversal
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 99%
Affected Products (NVD)
VendorProductVersion
kodikodi
17.1
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
kodi
bookworm
2:20.1+dfsg-1
fixed
bullseye
2:19.1+dfsg2-2+deb11u1
fixed
jessie
ignored
sid
2:21.1+dfsg-5
fixed
stretch
ignored
trixie
2:21.1+dfsg-5
fixed
wheezy
ignored
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
kodi
artful
ignored
bionic
needed
cosmic
ignored
disco
ignored
eoan
ignored
focal
not-affected
groovy
ignored
hirsute
ignored
impish
ignored
jammy
needed
kinetic
ignored
lunar
ignored
mantic
ignored
noble
needs-triage
precise
dne
trusty
dne
xenial
needed
yakkety
ignored
zesty
ignored
xbmc
artful
dne
bionic
dne
cosmic
dne
disco
dne
eoan
dne
focal
dne
groovy
dne
hirsute
dne
impish
dne
jammy
dne
kinetic
dne
lunar
dne
mantic
dne
noble
dne
precise
ignored
trusty
dne
xenial
dne
yakkety
ignored
zesty
dne