Collection of potential security issues in Jellyfin This is a non exhaustive list of potential security issues found in Jellyfin. Some of these might cause controversy. Some of these are design fla…

  • Saik0@lemmy.saik0.com
    link
    fedilink
    English
    arrow-up
    8
    ·
    edit-2
    1 day ago

    Source: R1 masters professor. Literally the person you would have needed to take the class from on the topic at my institution.

    This is a problem simply because most paths and names will be similar due to *arr suites and docker mounts normalizing them to a standard that jellyfin wants to see. In the context of Sony’s top 1000 movies, they can pre-compile the top 100 likely paths for the file (/movies, /mnt/movies, etc) then run the 100000 hash check through scripts against your instance. How long does it take to let a crawler collect http statuses on 100000 page loads? Now put that to a bot that gets jellyfin instances from a tool like shodan and add more hashes. If you flag, now onus is on you to prove you have license for content and they would have a case that you distributing (albeit weak) since your server was open to the public. This is child’s play level abuse-able. Risking that something easy like this isn’t being abused by Sony and others (you know… willing to install a rootkit on your computer types…) is a very silly stance to take.

    The hash that’s used to represent the path isn’t salted or otherwise unique.

    Edit: mobile typos.

    • Dempf@lemmy.zip
      link
      fedilink
      arrow-up
      2
      ·
      18 hours ago

      If I have rate limiting set up (through crowdsec) to prevent bots from scanning / crawling my server, should I be as worried?

      • Saik0@lemmy.saik0.com
        link
        fedilink
        English
        arrow-up
        3
        ·
        13 hours ago

        Probably not. But depending on how it’s configured it could still be a gamble/risk. A rate limiting setup can mitigate it a lot.