CVE-2017-5982
HIGH NUCLEIKodi - Path Traversal
Title source: ruleDescription
Directory traversal vulnerability in the Chorus2 2.4.2 add-on for Kodi allows remote attackers to read arbitrary files via a %2E%2E%252e (encoded dot dot slash) in the image path, as demonstrated by image/image%3A%2F%2F%2e%2e%252fetc%252fpasswd.
Exploits (2)
exploitdb
WRITEUP
VERIFIED
by Eric Flokstra · textwebappslinux
https://www.exploit-db.com/exploits/41312
metasploit
WORKING POC
by Eric Flokstra, jvoisin · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/http/kodi_traversal.rb
Nuclei Templates (1)
Kodi 17.1 - Local File Inclusion
HIGHby 0x_Akoko
References (5)
Scores
CVSS v3
7.5
EPSS
0.8642
EPSS Percentile
99.4%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Details
CWE
CWE-22
Status
published
Products (1)
kodi/kodi
17.1
Published
Feb 28, 2017
Tracked Since
Feb 18, 2026