CVE-2025-58761 (CNNVD-202509-1173)

HIGH
中文标题:
Tautulli 安全漏洞
英文标题:
Tautulli vulnerable to Unauthenticated Path Traversal in `real_pms_image_proxy`
CVSS分数: 8.6
发布时间: 2025-09-09 19:59:17
漏洞类型: 其他
状态: PUBLISHED
数据质量分数: 0.30
数据版本: v3
漏洞描述
中文描述:

Tautulli是Tautulli开源的一款用于监控Plex Media Server(媒体服务器)的应用程序。 Tautulli 2.15.3及之前版本存在安全漏洞,该漏洞源于real_pms_image_proxy端点存在路径遍历,可能导致任意文件读取。

英文描述:

Tautulli is a Python based monitoring and tracking tool for Plex Media Server. The `real_pms_image_proxy` endpoint in Tautulli v2.15.3 and prior is vulnerable to path traversal, allowing unauthenticated attackers to read arbitrary files from the application server's filesystem. The `real_pms_image_proxy` is used to fetch an image directly from the backing Plex Media Server. The image to be fetched is specified through an `img` URL parameter, which can either be a URL or a file path. There is some validation ensuring that `img` begins with the prefix `interfaces/default/images` in order to be served from the local filesystem. However this can be bypassed by passing an `img` parameter which begins with a valid prefix, and then adjoining path traversal characters in order to reach files outside of intended directories. An attacker can exfiltrate files on the application file system, including the `tautulli.db` SQLite database containing active JWT tokens, as well as the `config.ini` file which contains the hashed admin password, the JWT token secret, and the Plex Media Server token and connection details. If the password is cracked, or if a valid JWT token is present in the database, an unauthenticated attacker can escalate their privileges to obtain administrative control over the application. Version 2.16.0 contains a fix for the issue.

CWE类型:
CWE-27
标签:
(暂无数据)
受影响产品
厂商 产品 版本 版本范围 平台 CPE
Tautulli Tautulli < 2.16.0 - - cpe:2.3:a:tautulli:tautulli:<_2.16.0:*:*:*:*:*:*:*
tautulli tautulli * - - cpe:2.3:a:tautulli:tautulli:*:*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
https://github.com/Tautulli/Tautulli/security/advisories/GHSA-r732-m675-wj7w x_refsource_CONFIRM
cve.org
访问
https://github.com/Tautulli/Tautulli/commit/ec77a70aafc555e1aad0d9981f719d1200c117f1 x_refsource_MISC
cve.org
访问
CVSS评分详情
3.1 (cna)
HIGH
8.6
CVSS向量: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
机密性
HIGH
完整性
NONE
可用性
NONE
时间信息
发布时间:
2025-09-09 19:59:17
修改时间:
2025-09-10 13:47:59
创建时间:
2025-11-11 15:40:46
更新时间:
2025-11-11 16:00:09
利用信息
暂无可利用代码信息
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2025-58761 2025-11-11 15:23:30 2025-11-11 07:40:46
NVD nvd_CVE-2025-58761 2025-11-11 15:01:02 2025-11-11 07:48:32
CNNVD cnnvd_CNNVD-202509-1173 2025-11-11 15:12:56 2025-11-11 08:00:09
版本与语言
当前版本: v3
主要语言: EN
支持语言:
EN ZH
安全公告
暂无安全公告信息
变更历史
v3 CNNVD
2025-11-11 16:00:09
vulnerability_type: 未提取 → 其他; cnnvd_id: 未提取 → CNNVD-202509-1173; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> 其他
  • cnnvd_id: 未提取 -> CNNVD-202509-1173
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2025-11-11 15:48:32
affected_products_count: 1 → 2; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • affected_products_count: 1 -> 2
  • data_sources: ['cve'] -> ['cve', 'nvd']