Collection of potential security issues in Jellyfin This is a non exhaustive list of potential security issues found in Jellyfin. Some of these might cause controversy. Some of these are design fla…

    • spit_evil_olive_tips@beehaw.org
      link
      fedilink
      arrow-up
      13
      ·
      21 hours ago

      short answer: no, not really

      long answer, here’s an analogy that might help:

      you go to https://yourbank.com and log in with your username and password. you click the button to go to Online Bill Pay, and tell it to send ACME Plumbing $150 because they just fixed a leak under your sink.

      when you press “Send”, your browser does something like send a POST request to https://yourbank.com/send-bill-payment with a JSON blob like {"account_id": 1234567890, "recipient": "ACME Plumbing", "amount": 150.0} (this is heavily oversimplified, no actual online bank would work like this, but it’s close enough for the analogy)

      and all that happens over TLS. which means it’s “secure”. but security is not an absolute, things can only be secure with a particular threat model in mind. in the case of TLS, it means that if you were doing this at a coffee shop with an open wifi connection, no one else on the coffeeshop’s wifi would be able to eavesdrop and learn your password.

      (if your threat model is instead “someone at the coffeeshop looking over your shoulder while you type in your password”, no amount of TLS will save you from that)

      but with the type of vulnerability Jellyfin has, someone else can simply send their own POST request to https://yourbank.com/send-bill-payment with {"account_id": 1234567890, "recipient": "Bob's Shady Plumbing", "amount": 10000.0}. and your bank account will process that as you sending $10k to Bob’s Shady Plumbing.

      that request is also over TLS, but that doesn’t matter, because that’s security for a different level of the stack. the vulnerability is that you are logged in as account 1234567890, so you should be allowed to send those bill payment requests. random people who aren’t logged in as you should not be able to send bill payments on behalf of account 1234567890.

    • beek@beehaw.org
      link
      fedilink
      arrow-up
      20
      ·
      1 day ago

      Many of the issues are related to unauthenticated requests. Even though your reverse proxy provides SSL, Jellyfin still won’t know the difference between you and a random internet user. So, no, your setup doesn’t mitigate the security risks much at all.

    • Mora@pawb.social
      link
      fedilink
      arrow-up
      11
      ·
      1 day ago

      Not really, no. These are application flaws. Caddy will happily do its job and just let bad actors abuse them. (Unless you mean mTLS certs, then Caddy would only respond to those having a client certificate, which hopefully reduces the number of bad actors to your users😉)

    • paperemail@links.rocks
      link
      fedilink
      arrow-up
      6
      ·
      edit-2
      1 day ago

      Not unless the reverse proxy adds some layer of authentication as well. Something like HTTP basic auth, or mTLS (AKA 2-way TLS AKA client certificates)

      For nginx: https://docs.nginx.com/nginx/admin-guide/security-controls/configuring-http-basic-authentication/

      so if I add a user ”john” with password “mypassword” to video.example.com, you can try adding the login as: “https://john:[email protected]

      Most HTTP clients (e.g. browsers) support adding login like that. I don’t know what other jellyfin clients do that.

      The other option is to set up a VPN (I recommend wireguard)

      • jagged_circle@feddit.nl
        link
        fedilink
        English
        arrow-up
        1
        ·
        1 hour ago

        You can’t do that with jellyfin.

        Basic auth doesn’t work with jellyfin. Its a bug. Enable it on your reverse proxy, and jellyfin breaks. Devs closed it as wontfix

      • Saik0@lemmy.saik0.com
        link
        fedilink
        English
        arrow-up
        2
        ·
        6 hours ago

        Not unless the reverse proxy adds some layer of authentication as well.

        This is correct. However I’d want to add, that this will break EVERY app-based access of jellyfin which defeats the purpose for a lot of people. Adding auth in front of jellyfin will work and allow you to use the web client only.

        You kind of touched on it… I wanted to make it clear.

        VPN would be a better more interoperable answer for most cases, you’ll still be stuck on devices like WebOS on LG tvs, or roku devices, or others that don’t have the ability to install vpn clients.

        • jagged_circle@feddit.nl
          link
          fedilink
          English
          arrow-up
          1
          ·
          1 hour ago

          This is misinformation. It breaks the web app too.

          You can’t use basic auth with jellyfin at all. Its a bug. Jellyfin closed the bug as won’t fix because, it seems, they dont care about security.

    • Zozano@aussie.zone
      link
      fedilink
      English
      arrow-up
      6
      ·
      1 day ago

      I’m also an absolute dumbfuck. And I can confidently tell you, as a matter of fact, that I don’t know.

      I’m running SWAG reverse proxy, my DNS is not tunneled, I share my Jellyfin with others outside my network.

      My primary concern is my server gets hacked, or I get charged with distributing ‘public domain movies’

      • Flax@feddit.uk
        link
        fedilink
        English
        arrow-up
        2
        ·
        12 hours ago

        Hacking, even on an insecure system, would be illegal. Any copyright troll trying to sue a single user for having a private jellyfin instance which they hacked to find out about would probably have a hard time actually making a case.

        “Yeah, this one guy was distributing films to himself and a few friends. I know because I hacked him” doesn’t seem like a good case.

        • Saik0@lemmy.saik0.com
          link
          fedilink
          English
          arrow-up
          1
          ·
          6 hours ago

          Nothing about this is hacking. They’re not defeating any authentication mechanism to scan your system. That’s the whole problem here. Nothing illegal about running a crawler/scanner service.

          The fact that you have their content publicly accessible is not a “bad case” at all. Open FTP sites were sued plenty. It may be a bit harder to prove distribution intentions… but wouldn’t be hard to make a case that you violated copyright for the content they could enumerate.

          • Flax@feddit.uk
            link
            fedilink
            English
            arrow-up
            1
            ·
            17 minutes ago

            It’s not publicly accessible, though. An account is clearly needed.