CVE-2021-29490
MEDIUM NUCLEIJellyfin < 10.7.3 - SSRF
Title source: ruleDescription
Jellyfin is a free software media system that provides media from a dedicated server to end-user devices via multiple apps. Verions prior to 10.7.3 vulnerable to unauthenticated Server-Side Request Forgery (SSRF) attacks via the imageUrl parameter. This issue potentially exposes both internal and external HTTP servers or other resources available via HTTP `GET` that are visible from the Jellyfin server. The vulnerability is patched in version 10.7.3. As a workaround, disable external access to the API endpoints `/Items/*/RemoteImages/Download`, `/Items/RemoteSearch/Image` and `/Images/Remote` via reverse proxy, or limit to known-friendly IPs.
Nuclei Templates (1)
Jellyfin 10.7.2 - Server Side Request Forgery
MEDIUMVERIFIEDby alph4byt3
Shodan:
http.title:"Jellyfin"
FOFA:
body="jellyfin"
Scores
CVSS v3
5.8
EPSS
0.8818
EPSS Percentile
99.5%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
Details
CWE
CWE-918
Status
published
Products (1)
jellyfin/jellyfin
< 10.7.3
Published
May 06, 2021
Tracked Since
Feb 18, 2026