Jellyfin prior to 10.7.0 Unauthenticated Arbitrary File Read

By
Rejah Rehim
Published on
01 Oct 2021
Vulnerability

Jellyfin is a media system that runs on free software. With some endpoints in Jellyfin prior to version 10.7.1, well-crafted requests will allow arbitrary files to be read from a Jellyfin server’s file system. When Windows is used as the host operating system, this problem is more common. Servers that are connected to the Internet are potentially vulnerable.This has been addressed in version 10.7.1. Users may be able to restrict some access as a workaround by applying rigorous security permissions on their filesystem, but it is strongly advised that they upgrade as soon as possible.

Mitigation / Precaution

In order to patch this vulnerability, please install the official patch Jellyfin made available for supported, vulnerable instances.

Automated human-like penetration testing for your web apps & APIs
Teams using Beagle Security are set up in minutes, embrace release-based CI/CD security testing and save up to 65% with timely remediation of vulnerabilities. Sign up for a free account to see what it can do for you.

Written by
Rejah Rehim
Rejah Rehim
Co-founder, Director
Find website security issues in a flash
Improve your website's security posture with proactive vulnerability detection.
Free website security assessment
Experience the power of automated penetration testing & contextual reporting.