Описание
Jellyfin is a Free Software Media System for managing and streaming media. In affected versions there is an argument injection in the VideosController, specifically the /Videos/<itemId>/stream and /Videos/<itemId>/stream.<container> endpoints which are present in the current Jellyfin version. Additional endpoints in the AudioController might also be vulnerable, as they differ only slightly in execution. Those endpoints are reachable by an unauthenticated user. In order to exploit this vulnerability an unauthenticated attacker has to guess an itemId, which is a completely random GUID. It’s a very unlikely case even for a large media database with lots of items. Without an additional information leak, this vulnerability shouldn’t be directly exploitable, even if the instance is reachable from the Internet. There are a lot of query parameters that get accepted by the method. At least two of those, videoCodec and audioCodec are vulnerable to the argument injection. The values can b
Ссылки
- Not Applicable
- Not Applicable
- Not Applicable
- Patch
- Issue TrackingThird Party Advisory
- ExploitVendor Advisory
- Not Applicable
- Not Applicable
- Not Applicable
- Patch
- Issue TrackingThird Party Advisory
- ExploitVendor Advisory
Уязвимые конфигурации
EPSS
7.7 High
CVSS3
8.8 High
CVSS3
Дефекты
Связанные уязвимости
Jellyfin is a Free Software Media System for managing and streaming me ...
EPSS
7.7 High
CVSS3
8.8 High
CVSS3