This is a summary of the AI-generated 10-question deep analysis. The full version (longer answers, follow-up Q&A, related CVEs) requires login. Read the full analysis β
Q1What is this vulnerability? (Essence + Consequences)
π¨ **Essence**: Jellyfin < 10.7.3 suffers from an SSRF vulnerability. π **Consequences**: Attackers can expose internal/external HTTP servers and access resources normally hidden from users via HTTP GET requests.β¦
π‘οΈ **Root Cause**: CWE-918 (Server-Side Request Forgery). π₯ **Flaw**: The `imageUrl` parameter in `RemoteImageController.cs` is not properly validated.β¦
π¦ **Vendor**: Jellyfin. π **Affected Versions**: All versions **prior to 10.7.3**. β **Fixed In**: Version 10.7.3 and above. π **Component**: Media streaming server functionality.
Q4What can hackers do? (Privileges/Data)
π΅οΈ **Action**: Unauthenticated SSRF attacks. π **Target**: Internal network services, cloud metadata endpoints, or external resources. π **Data**: Can read content from HTTP servers that are not publicly accessible.β¦
π **Auth**: None required! (Unauthenticated). π― **Config**: Low complexity. π **Threshold**: Very Low. Any user can trigger the vulnerability via the `imageUrl` parameter without logging in. β‘ Easy to exploit.
Q6Is there a public Exp? (PoC/Wild Exploitation)
π **PoC Available**: Yes. π **Sources**: ProjectDiscovery Nuclei templates & Awesome-POC GitHub repo. π **Wild Exploit**: Likely high due to simplicity and lack of auth. π§ͺ Testable via standard SSRF payloads.
Q7How to self-check? (Features/Scanning)
π **Check**: Scan for Jellyfin instances. π§ͺ **Test**: Send SSRF payloads via the `imageUrl` parameter in API requests. π οΈ **Tools**: Use Nuclei templates (`CVE-2021-29490.yaml`) for automated detection.β¦
β **Fixed**: Yes. π **Patch Date**: Published May 5, 2021. π **Action**: Upgrade Jellyfin to **version 10.7.3 or later**. π **Advisory**: See GitHub Security Advisory GHSA-rgjw-4fwc-9v96.
Q9What if no patch? (Workaround)
π§ **Workaround**: If upgrading isn't possible, restrict network access to the Jellyfin server. π Block outbound HTTP requests from the server to internal/private IP ranges.β¦
β οΈ **Priority**: Medium-High. π **CVSS**: 5.3 (Medium). π **Urgency**: Fix ASAP if exposed to the internet. π‘οΈ **Reason**: Unauthenticated SSRF is a critical risk for internal network reconnaissance and data leakage.β¦