In Jellyfin 10.8.x through 10.8.3, the name of a collection is vulnerable to stored XSS. This allows an attacker to steal access tokens from the localStorage of the victim.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://herolab.usd.de/security-advisories/ | third party advisory |
https://github.com/jellyfin/jellyfin-web/issues/3788 | third party advisory issue tracking |
https://herolab.usd.de/security-advisories/usd-2022-0031/ | third party advisory exploit |