CVE-2023-49096

Jellyfin is a Free Software Media System for managing and streaming media. In affected versions there is an argument injection in the VideosController, specifically the `/Videos/<itemId>/stream` and `/Videos/<itemId>/stream.<container>` endpoints which are present in the current Jellyfin version. Additional endpoints in the AudioController might also be vulnerable, as they differ only slightly in execution. Those endpoints are reachable by an unauthenticated user. In order to exploit this vulnerability an unauthenticated attacker has to guess an itemId, which is a completely random GUID. It’s a very unlikely case even for a large media database with lots of items. Without an additional information leak, this vulnerability shouldn’t be directly exploitable, even if the instance is reachable from the Internet. There are a lot of query parameters that get accepted by the method. At least two of those, videoCodec and audioCodec are vulnerable to the argument injection. The values can be traced through a lot of code and might be changed in the process. However, the fallback is to always use them as-is, which means we can inject our own arguments. Those arguments land in the command line of FFmpeg. Because UseShellExecute is always set to false, we can’t simply terminate the FFmpeg command and execute our own. It should only be possible to add additional arguments to FFmpeg, which is powerful enough as it stands. There is probably a way of overwriting an arbitrary file with malicious content. This vulnerability has been addressed in version 10.8.13. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Configurations

Configuration 1 (hide)

cpe:2.3:a:jellyfin:jellyfin:*:*:*:*:*:*:*:*

History

21 Nov 2024, 08:32

Type Values Removed Values Added
References () https://cwe.mitre.org/data/definitions/88.html - Not Applicable () https://cwe.mitre.org/data/definitions/88.html - Not Applicable
References () https://en.wikipedia.org/wiki/Pass_the_hash - Not Applicable () https://en.wikipedia.org/wiki/Pass_the_hash - Not Applicable
References () https://ffmpeg.org/ffmpeg-filters.html#drawtext-1 - Not Applicable () https://ffmpeg.org/ffmpeg-filters.html#drawtext-1 - Not Applicable
References () https://github.com/jellyfin/jellyfin/commit/a656799dc879d16d21bf2ce7ad412ebd5d45394a - Patch () https://github.com/jellyfin/jellyfin/commit/a656799dc879d16d21bf2ce7ad412ebd5d45394a - Patch
References () https://github.com/jellyfin/jellyfin/issues/5415 - Issue Tracking, Third Party Advisory () https://github.com/jellyfin/jellyfin/issues/5415 - Issue Tracking, Third Party Advisory
References () https://github.com/jellyfin/jellyfin/security/advisories/GHSA-866x-wj5j-2vf4 - Exploit, Vendor Advisory () https://github.com/jellyfin/jellyfin/security/advisories/GHSA-866x-wj5j-2vf4 - Exploit, Vendor Advisory
CVSS v2 : unknown
v3 : 8.8
v2 : unknown
v3 : 7.7

12 Dec 2023, 16:09

Type Values Removed Values Added
First Time Jellyfin
Jellyfin jellyfin
References () https://ffmpeg.org/ffmpeg-filters.html#drawtext-1 - () https://ffmpeg.org/ffmpeg-filters.html#drawtext-1 - Not Applicable
References () https://github.com/jellyfin/jellyfin/security/advisories/GHSA-866x-wj5j-2vf4 - () https://github.com/jellyfin/jellyfin/security/advisories/GHSA-866x-wj5j-2vf4 - Exploit, Vendor Advisory
References () https://github.com/jellyfin/jellyfin/issues/5415 - () https://github.com/jellyfin/jellyfin/issues/5415 - Issue Tracking, Third Party Advisory
References () https://cwe.mitre.org/data/definitions/88.html - () https://cwe.mitre.org/data/definitions/88.html - Not Applicable
References () https://en.wikipedia.org/wiki/Pass_the_hash - () https://en.wikipedia.org/wiki/Pass_the_hash - Not Applicable
References () https://github.com/jellyfin/jellyfin/commit/a656799dc879d16d21bf2ce7ad412ebd5d45394a - () https://github.com/jellyfin/jellyfin/commit/a656799dc879d16d21bf2ce7ad412ebd5d45394a - Patch
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8
CPE cpe:2.3:a:jellyfin:jellyfin:*:*:*:*:*:*:*:*

06 Dec 2023, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-12-06 20:15

Updated : 2024-11-21 08:32


NVD link : CVE-2023-49096

Mitre link : CVE-2023-49096

CVE.ORG link : CVE-2023-49096


JSON object : View

Products Affected

jellyfin

  • jellyfin
CWE
CWE-88

Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')