
Cloud Vulnerability DB
A community-led vulnerabilities database
Audiobookshelf, a self-hosted audiobook and podcast server, was found to contain a path traversal vulnerability (CVE-2023-47624) in versions 2.4.3 and prior. The vulnerability was discovered in the /hls endpoint, which allowed any user, regardless of their permission level, to potentially access files from the local file system (GitHub Advisory).
The vulnerability exists in the HlsRouter.js component where path traversal was possible due to insufficient path validation. The vulnerable code concatenates user input from req.params.stream and req.params.file with the StreamsPath without proper sanitization: var fullFilePath = Path.join(this.playbackSessionManager.StreamsPath, streamId, req.params.file). This implementation allows attackers to use '../' sequences to traverse directories and access files outside the intended directory (GitHub Code). The vulnerability has been assigned a CVSS v3.1 base score of 7.5 HIGH by GitHub and 6.5 MEDIUM by NVD (NVD).
The vulnerability allows unauthorized access to files on the local file system through path traversal, potentially leading to information disclosure. Any user of the system, regardless of their assigned permissions, could exploit this vulnerability to read sensitive files from the server (GitHub Advisory).
As of the vulnerability's publication, no patches were available for this issue (NVD). Users should monitor for updates from the Audiobookshelf project and implement strict access controls to the server in the meantime.
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."