In Jellyfin 10.8.x through 10.8.3, the name of a playlist is vulnerable to stored XSS. This allows an attacker to steal access tokens from the localStorage of the victim.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://herolab.usd.de/security-advisories/ | third party advisory |
https://github.com/jellyfin/jellyfin-web/issues/3788 | issue tracking patch exploit third party advisory |
https://herolab.usd.de/security-advisories/usd-2022-0030/ | third party advisory exploit |