CVE-2025-58760 (CNNVD-202509-1175)

HIGH
中文标题:
Tautulli 安全漏洞
英文标题:
Tautulli vulnerable to Unauthenticated Path Traversal in `/image` endpoint
CVSS分数: 8.6
发布时间: 2025-09-09 19:56:57
漏洞类型: 其他
状态: PUBLISHED
数据质量分数: 0.30
数据版本: v3
漏洞描述
中文描述:

Tautulli是Tautulli开源的一款用于监控Plex Media Server(媒体服务器)的应用程序。 Tautulli 2.15.3及之前版本存在安全漏洞,该漏洞源于/image端点存在路径遍历,可能导致任意文件读取。

英文描述:

Tautulli is a Python based monitoring and tracking tool for Plex Media Server. The `/image` API endpoint in Tautulli v2.15.3 and earlier is vulnerable to path traversal, allowing unauthenticated attackers to read arbitrary files from the application server's filesystem. In Tautulli, the `/image` API endpoint is used to serve static images from the application's data directory to users. This endpoint can be accessed without authentication, and its intended purpose is for server background images and icons within the user interface. Attackers can exfiltrate files from the application file system, including the `tautulli.db` SQLite database containing active JWT tokens, as well as the `config.ini` file which contains the hashed admin password, the JWT token secret, and the Plex Media Server token and connection details. If the password is cracked, or if a valid JWT token is present in the database, an unauthenticated attacker can escalate their privileges to obtain administrative control over the application. Version 2.16.0 contains a fix for the issue.

CWE类型:
CWE-23
标签:
(暂无数据)
受影响产品
厂商 产品 版本 版本范围 平台 CPE
Tautulli Tautulli < 2.16.0 - - cpe:2.3:a:tautulli:tautulli:<_2.16.0:*:*:*:*:*:*:*
tautulli tautulli * - - cpe:2.3:a:tautulli:tautulli:*:*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
https://github.com/Tautulli/Tautulli/security/advisories/GHSA-8g4r-8f3f-hghp x_refsource_CONFIRM
cve.org
访问
https://github.com/Tautulli/Tautulli/commit/47566128e2e5dde98980d59b7a51b98173bc0b40 x_refsource_MISC
cve.org
访问
CVSS评分详情
3.1 (cna)
HIGH
8.6
CVSS向量: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
机密性
HIGH
完整性
NONE
可用性
NONE
时间信息
发布时间:
2025-09-09 19:56:57
修改时间:
2025-09-10 20:18:02
创建时间:
2025-11-11 15:40:46
更新时间:
2025-11-11 16:00:09
利用信息
暂无可利用代码信息
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2025-58760 2025-11-11 15:23:30 2025-11-11 07:40:46
NVD nvd_CVE-2025-58760 2025-11-11 15:01:02 2025-11-11 07:48:32
CNNVD cnnvd_CNNVD-202509-1175 2025-11-11 15:12:56 2025-11-11 08:00:09
版本与语言
当前版本: v3
主要语言: EN
支持语言:
EN ZH
安全公告
暂无安全公告信息
变更历史
v3 CNNVD
2025-11-11 16:00:09
vulnerability_type: 未提取 → 其他; cnnvd_id: 未提取 → CNNVD-202509-1175; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> 其他
  • cnnvd_id: 未提取 -> CNNVD-202509-1175
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2025-11-11 15:48:32
affected_products_count: 1 → 2; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • affected_products_count: 1 -> 2
  • data_sources: ['cve'] -> ['cve', 'nvd']