Server-side Request Forgery (SSRF) Affecting jellyfin.common package, versions [0,10.7.3)
Snyk CVSS
Attack Complexity
Low
Scope
Changed
Threat Intelligence
Exploit Maturity
Proof of concept
EPSS
0.16% (52nd
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DOTNET-JELLYFINCOMMON-1290553
- published 9 May 2021
- disclosed 9 May 2021
- credit Ian Walton, João Zamite, Adam Bertrand
Introduced: 9 May 2021
CVE-2021-29490 Open this link in a new tabHow to fix?
Upgrade Jellyfin.Common
to version 10.7.3 or higher.
Overview
Jellyfin.Common is an a Free Software Media System that puts you in control of managing and streaming your media.
Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) via the imageUrl
parameter, in the /Images/Remote?imageUrl=<URL>
, /Items/RemoteSearch/Image?ImageUrl=<URL>&ProviderName=TheMovieDB
, and /Items/{itemId}/RemoteImages/Download
API endpoints.