5
CVSSv2

CVE-2021-29490

Published: 06/05/2021 Updated: 13/05/2021
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 5.8 | Impact Score: 1.4 | Exploitability Score: 3.9
VMScore: 448
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

Jellyfin is a free software media system that provides media from a dedicated server to end-user devices via multiple apps. Verions before 10.7.3 vulnerable to unauthenticated Server-Side Request Forgery (SSRF) attacks via the imageUrl parameter. This issue potentially exposes both internal and external HTTP servers or other resources available via HTTP `GET` that are visible from the Jellyfin server. The vulnerability is patched in version 10.7.3. As a workaround, disable external access to the API endpoints `/Items/*/RemoteImages/Download`, `/Items/RemoteSearch/Image` and `/Images/Remote` via reverse proxy, or limit to known-friendly IPs.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product