{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-4167","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2023-08-04T21:03:33.586Z","datePublished":"2023-08-05T16:00:06.053Z","dateUpdated":"2024-08-02T07:17:12.287Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2023-10-24T08:18:34.092Z"},"title":"Media Browser Emby Server cross site scripting","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-79","lang":"en","description":"CWE-79 Cross Site Scripting"}]}],"affected":[{"vendor":"Media Browser","product":"Emby Server","versions":[{"version":"4.7.13.0","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability was found in Media Browser Emby Server 4.7.13.0 and classified as problematic. This issue affects some unknown processing of the file /web/. The manipulation leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-236183."},{"lang":"de","value":"Eine problematische Schwachstelle wurde in Media Browser Emby Server 4.7.13.0 gefunden. Betroffen davon ist ein unbekannter Prozess der Datei /web/. Mit der Manipulation mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung. Als bestmögliche Massnahme wird das Einspielen eines Upgrades empfohlen."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":3.5,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N","baseSeverity":"LOW"}},{"cvssV3_0":{"version":"3.0","baseScore":3.5,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N","baseSeverity":"LOW"}},{"cvssV2_0":{"version":"2.0","baseScore":4,"vectorString":"AV:N/AC:L/Au:S/C:N/I:P/A:N"}}],"timeline":[{"time":"2023-08-04T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2023-08-04T00:00:00.000Z","lang":"en","value":"CVE reserved"},{"time":"2023-08-04T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2023-08-26T20:47:44.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"whoamiechor (VulDB User)","type":"analyst"}],"references":[{"url":"https://vuldb.com/?id.236183","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.236183","tags":["signature","permissions-required"]},{"url":"https://github.com/whoamiecho/vuls/blob/main/emby.md","tags":["exploit"]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T07:17:12.287Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.236183","tags":["vdb-entry","technical-description","x_transferred"]},{"url":"https://vuldb.com/?ctiid.236183","tags":["signature","permissions-required","x_transferred"]},{"url":"https://github.com/whoamiecho/vuls/blob/main/emby.md","tags":["exploit","x_transferred"]}]}]}}