CVE-2021-29490

MEDIUM NUCLEI

Jellyfin < 10.7.3 - SSRF

Title source: rule

Description

Jellyfin is a free software media system that provides media from a dedicated server to end-user devices via multiple apps. Verions prior to 10.7.3 vulnerable to unauthenticated Server-Side Request Forgery (SSRF) attacks via the imageUrl parameter. This issue potentially exposes both internal and external HTTP servers or other resources available via HTTP `GET` that are visible from the Jellyfin server. The vulnerability is patched in version 10.7.3. As a workaround, disable external access to the API endpoints `/Items/*/RemoteImages/Download`, `/Items/RemoteSearch/Image` and `/Images/Remote` via reverse proxy, or limit to known-friendly IPs.

Nuclei Templates (1)

Jellyfin 10.7.2 - Server Side Request Forgery
MEDIUMVERIFIEDby alph4byt3
Shodan: http.title:"Jellyfin"
FOFA: body="jellyfin"

Scores

CVSS v3 5.8
EPSS 0.8818
EPSS Percentile 99.5%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N

Details

CWE
CWE-918
Status published
Products (1)
jellyfin/jellyfin < 10.7.3
Published May 06, 2021
Tracked Since Feb 18, 2026