Jellyfin up to v10.7.7 was discovered to contain a Server-Side Request Forgery (SSRF) via the component /Repositories. This vulnerability allows attackers to access network resources and sensitive information via a crafted POST request.
References
| Link | Resource |
|---|---|
| http://jellyfin.com | Broken Link |
| https://gist.github.com/b33t1e/5c067e0538a0b712dc3d59bd4b9a5952 | |
| https://github.com/jellyfin/jellyfin | Product |
| https://notes.sjtu.edu.cn/s/yJ9lPk09a | Exploit Third Party Advisory |
| http://jellyfin.com | Broken Link |
| https://gist.github.com/b33t1e/5c067e0538a0b712dc3d59bd4b9a5952 | |
| https://github.com/jellyfin/jellyfin | Product |
| https://notes.sjtu.edu.cn/s/yJ9lPk09a | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 07:52
| Type | Values Removed | Values Added |
|---|---|---|
| References | () http://jellyfin.com - Broken Link | |
| References | () https://gist.github.com/b33t1e/5c067e0538a0b712dc3d59bd4b9a5952 - | |
| References | () https://github.com/jellyfin/jellyfin - Product | |
| References | () https://notes.sjtu.edu.cn/s/yJ9lPk09a - Exploit, Third Party Advisory |
31 Mar 2023, 19:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
15 Mar 2023, 16:16
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
| CPE | cpe:2.3:a:jellyfin:jellyfin:*:*:*:*:*:*:*:* | |
| References | (MISC) https://notes.sjtu.edu.cn/s/yJ9lPk09a - Exploit, Third Party Advisory | |
| References | (MISC) http://jellyfin.com - Broken Link | |
| References | (MISC) https://github.com/jellyfin/jellyfin - Product | |
| CWE | CWE-918 |
10 Mar 2023, 17:23
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2023-03-10 16:15
Updated : 2025-02-28 22:15
NVD link : CVE-2023-27161
Mitre link : CVE-2023-27161
CVE.ORG link : CVE-2023-27161
JSON object : View
Products Affected
jellyfin
- jellyfin
CWE
CWE-918
Server-Side Request Forgery (SSRF)
