
Cloud Vulnerability DB
A community-led vulnerabilities database
Jellyfin versions up to 10.7.7 contain a Server-Side Request Forgery (SSRF) vulnerability in the /Repositories API endpoint. This vulnerability allows attackers to access network resources and sensitive information via a crafted POST request (GitHub Gist, SJTU Notes).
The vulnerability exists in the /Repositories API endpoint where the 'url' parameter is not properly validated. Attackers can modify the repository URL through a POST request to point to arbitrary internal or external network resources. The vulnerability can be exploited by sending a crafted POST request to the /Repositories endpoint with a malicious URL in the payload (SJTU Notes).
The vulnerability can lead to several security issues: information disclosure and data exfiltration of internal resources, unauthorized access to internal network HTTP servers including services like Nginx or internal APIs, and the ability to perform port and IP scanning of the internal network. The attacker can access any resource that can be obtained via HTTP requests on the local network of the webserver (SJTU Notes).
Users should upgrade to a version newer than 10.7.7 to address this vulnerability. No specific workarounds have been publicly documented for users who cannot upgrade immediately (GitHub Gist).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."