CVE-2017-5982
Summary
| CVE | CVE-2017-5982 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2017-02-28 18:59:00 UTC |
| Updated | 2024-01-23 07:15:00 UTC |
| Description | Directory traversal vulnerability in the Chorus2 2.4.2 add-on for Kodi allows remote attackers to read arbitrary files via a %2E%2E%252e (encoded dot dot slash) in the image path, as demonstrated by image/image%3A%2F%2F%2e%2e%252fetc%252fpasswd. |
Risk And Classification
Problem Types: CWE-22
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Kodi Chorus2 CVE-2017-5982 Directory Traversal Vulnerability | BID | www.securityfocus.com | |
| Kodi 17.1 Arbitrary File Disclosure ≈ Packet Storm | MISC | packetstormsecurity.com | Exploit, Third Party Advisory, VDB Entry |
| Full Disclosure: [Kodi v17.1] - Local File Inclusion | FULLDISC | seclists.org | Exploit, Third Party Advisory, VDB Entry |
| [SECURITY] [DLA 3712-1] kodi security update | lists.debian.org | ||
| Kodi 17.1 - Arbitrary File Disclosure | EXPLOIT-DB | www.exploit-db.com | Exploit, Third Party Advisory, VDB Entry |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 6000437 Debian Security Update for kodi (DLA 3712-1)