Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2021-21402 β€” AI Deep Analysis Summary

CVSS 7.7 Β· High

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: Path Traversal in Jellyfin < 10.7.1 allows reading arbitrary files from the server's filesystem. πŸ’₯ **Consequences**: Sensitive data exposure, potential system compromise, especially on Windows hosts.

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: CWE-22 (Path Traversal). The application fails to properly sanitize user input in URLs, allowing `../` sequences to escape the intended directory.

Q3Who is affected? (Versions/Components)

πŸ“¦ **Affected**: Jellyfin versions **before 10.7.1**. Components: Media server core handling audio/streaming requests.

Q4What can hackers do? (Privileges/Data)

πŸ•΅οΈ **Attacker Capabilities**: Read arbitrary files (e.g., config files, source code, credentials). No privilege escalation needed, just file access.

Q5Is exploitation threshold high? (Auth/Config)

πŸ”“ **Exploitation Threshold**: **Low**. Requires **Local Privileges** (PR:L) but **Low Complexity** (AC:L) and **No User Interaction** (UI:N). Network accessible (AV:N).

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ’£ **Public Exp?**: **YES**. Multiple PoCs available on GitHub (Python, Wker scripts, Nuclei templates). Easy to automate for batch scanning.

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: Send crafted GET requests with `..%5C` (URL-encoded backslash) to audio/stream endpoints. Check for `200 OK` and file content (e.g., `win.ini` on Windows).

Q8Is it fixed officially? (Patch/Mitigation)

βœ… **Fixed?**: **YES**. Officially patched in **Jellyfin 10.7.1**. Upgrade immediately via official downloads.

Q9What if no patch? (Workaround)

🚧 **No Patch Workaround**: Implement strict filesystem permissions on the server. Restrict access to sensitive directories. Not a full fix, but reduces risk.

Q10Is it urgent? (Priority Suggestion)

⚑ **Urgency**: **HIGH**. CVSS Score: **7.5** (High). Public exploits exist. If exposed to the internet, immediate patching is critical.