Audiobookshelf is a self-hosted audiobook and podcast server. In versions 2.4.3 and prior, any user (regardless of their permissions) may be able to read files from the local file system due to a path traversal in the `/hls` endpoint. This issue may lead to Information Disclosure. As of time of publication, no patches are available.
References
Link | Resource |
---|---|
https://github.com/advplyr/audiobookshelf/blob/d7b2476473ef1934eedec41425837cddf2d4b13e/server/routers/HlsRouter.js#L32 | Product |
https://securitylab.github.com/advisories/GHSL-2023-203_GHSL-2023-204_audiobookshelf/ | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2023-12-13 21:15
Updated : 2023-12-19 15:33
NVD link : CVE-2023-47624
Mitre link : CVE-2023-47624
CVE.ORG link : CVE-2023-47624
JSON object : View
Products Affected
audiobookshelf
- audiobookshelf
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')