CVE-2023-23635: Jellyfin Web Cross-Site Scripting (XSS) via Collection Name
(updated )
In Jellyfin 10.8.x through 10.8.3, the name of a collection is vulnerable to stored XSS. This allows an attacker to steal access tokens from the localStorage of the victim.
References
- github.com/advisories/GHSA-749c-pc87-4qcw
- github.com/jellyfin/jellyfin-web
- github.com/jellyfin/jellyfin-web/issues/3788
- github.com/jellyfin/jellyfin-web/pull/3789
- github.com/jellyfin/jellyfin/releases/tag/v10.8.4
- herolab.usd.de/security-advisories
- herolab.usd.de/security-advisories/usd-2022-0031
- nvd.nist.gov/vuln/detail/CVE-2023-23635
Code Behaviors & Features
Detect and mitigate CVE-2023-23635 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →