230

Collection of potential security issues in Jellyfin This is a non exhaustive list of potential security issues found in Jellyfin. Some of these might cause controversy. Some of these are design fla...

you are viewing a single comment's thread
view the rest of the comments
[-] walden@sub.wetshaving.social 8 points 2 days ago

I'm not smart, can you tell me if having it behind a reverse proxy with certs and everything fixes any of these flaws?

[-] spit_evil_olive_tips@beehaw.org 13 points 1 day ago

short answer: no, not really

long answer, here's an analogy that might help:

you go to https://yourbank.com and log in with your username and password. you click the button to go to Online Bill Pay, and tell it to send ACME Plumbing $150 because they just fixed a leak under your sink.

when you press "Send", your browser does something like send a POST request to https://yourbank.com/send-bill-payment with a JSON blob like {"account_id": 1234567890, "recipient": "ACME Plumbing", "amount": 150.0} (this is heavily oversimplified, no actual online bank would work like this, but it's close enough for the analogy)

and all that happens over TLS. which means it's "secure". but security is not an absolute, things can only be secure with a particular threat model in mind. in the case of TLS, it means that if you were doing this at a coffee shop with an open wifi connection, no one else on the coffeeshop's wifi would be able to eavesdrop and learn your password.

(if your threat model is instead "someone at the coffeeshop looking over your shoulder while you type in your password", no amount of TLS will save you from that)

but with the type of vulnerability Jellyfin has, someone else can simply send their own POST request to https://yourbank.com/send-bill-payment with {"account_id": 1234567890, "recipient": "Bob's Shady Plumbing", "amount": 10000.0}. and your bank account will process that as you sending $10k to Bob's Shady Plumbing.

that request is also over TLS, but that doesn't matter, because that's security for a different level of the stack. the vulnerability is that you are logged in as account 1234567890, so you should be allowed to send those bill payment requests. random people who aren't logged in as you should not be able to send bill payments on behalf of account 1234567890.

[-] beek@beehaw.org 20 points 2 days ago

Many of the issues are related to unauthenticated requests. Even though your reverse proxy provides SSL, Jellyfin still won’t know the difference between you and a random internet user. So, no, your setup doesn’t mitigate the security risks much at all.

[-] Mora@pawb.social 11 points 2 days ago

Not really, no. These are application flaws. Caddy will happily do its job and just let bad actors abuse them. (Unless you mean mTLS certs, then Caddy would only respond to those having a client certificate, which hopefully reduces the number of bad actors to your users😉)

[-] paperemail@links.rocks 6 points 2 days ago* (last edited 2 days ago)

Not unless the reverse proxy adds some layer of authentication as well. Something like HTTP basic auth, or mTLS (AKA 2-way TLS AKA client certificates)

For nginx: https://docs.nginx.com/nginx/admin-guide/security-controls/configuring-http-basic-authentication/

so if I add a user ”john” with password “mypassword” to video.example.com, you can try adding the login as: “https://john:mypassword@video.example.com”

Most HTTP clients (e.g. browsers) support adding login like that. I don’t know what other jellyfin clients do that.

The other option is to set up a VPN (I recommend wireguard)

[-] jagged_circle@feddit.nl 2 points 1 day ago

You can't do that with jellyfin.

Basic auth doesn't work with jellyfin. Its a bug. Enable it on your reverse proxy, and jellyfin breaks. Devs closed it as wontfix

[-] paperemail@links.rocks 2 points 12 hours ago

That sucks, good to know.

Looks like creating a VPN is the only option for securing jellyfin.

[-] Saik0Shinigami@lemmy.saik0.com 2 points 1 day ago

Not unless the reverse proxy adds some layer of authentication as well.

This is correct. However I'd want to add, that this will break EVERY app-based access of jellyfin which defeats the purpose for a lot of people. Adding auth in front of jellyfin will work and allow you to use the web client only.

You kind of touched on it... I wanted to make it clear.

VPN would be a better more interoperable answer for most cases, you'll still be stuck on devices like WebOS on LG tvs, or roku devices, or others that don't have the ability to install vpn clients.

[-] jagged_circle@feddit.nl 1 points 1 day ago

This is misinformation. It breaks the web app too.

You can't use basic auth with jellyfin at all. Its a bug. Jellyfin closed the bug as won't fix because, it seems, they dont care about security.

[-] Saik0Shinigami@lemmy.saik0.com 1 points 20 hours ago

Oh, sure enough. Basic auth breaks the login function. I didn't test it myself and didn't think that it wouldn't work for basic auth. I've put other auths in front of it and it works. So It's not completely "misinformation". Just annoying that the easiest most basic form of auth won't work.

[-] jagged_circle@feddit.nl 1 points 19 hours ago* (last edited 19 hours ago)

What other auths can you put in front of it?

The problem is that they're (ab)using the Auth header, which causes a colission and you can't load many required assets.

[-] Saik0Shinigami@lemmy.saik0.com 1 points 13 hours ago

I was testing a 2fa based one the other weak and jellyfin was the service I decided to test with. Ultimately didnt like it so I rolled ot back.I'd have to go look it up to get you a name.

[-] Zozano@aussie.zone 6 points 2 days ago

I'm also an absolute dumbfuck. And I can confidently tell you, as a matter of fact, that I don't know.

I'm running SWAG reverse proxy, my DNS is not tunneled, I share my Jellyfin with others outside my network.

My primary concern is my server gets hacked, or I get charged with distributing 'public domain movies'

[-] Flax_vert@feddit.uk 1 points 1 day ago

Hacking, even on an insecure system, would be illegal. Any copyright troll trying to sue a single user for having a private jellyfin instance which they hacked to find out about would probably have a hard time actually making a case.

"Yeah, this one guy was distributing films to himself and a few friends. I know because I hacked him" doesn't seem like a good case.

[-] Saik0Shinigami@lemmy.saik0.com 1 points 1 day ago

Nothing about this is hacking. They're not defeating any authentication mechanism to scan your system. That's the whole problem here. Nothing illegal about running a crawler/scanner service.

The fact that you have their content publicly accessible is not a "bad case" at all. Open FTP sites were sued plenty. It may be a bit harder to prove distribution intentions... but wouldn't be hard to make a case that you violated copyright for the content they could enumerate.

[-] Flax_vert@feddit.uk 1 points 1 day ago

It's not publicly accessible, though. An account is clearly needed.

[-] Saik0Shinigami@lemmy.saik0.com 1 points 21 hours ago

No... that's the point of this thread. There is no requirement to login in order to manually access endpoints. Up to and including pulling video data.

[-] mark@social.cool110.xyz 6 points 2 days ago

@walden @Scary_le_Poo Only if the reverse proxy has its own login on top of Jellyfin's, and even that only mitigates some of them.

this post was submitted on 02 Apr 2025
230 points (100.0% liked)

Technology

38453 readers
423 users here now

A nice place to discuss rumors, happenings, innovations, and challenges in the technology sphere. We also welcome discussions on the intersections of technology and society. If it’s technological news or discussion of technology, it probably belongs here.

Remember the overriding ethos on Beehaw: Be(e) Nice. Each user you encounter here is a person, and should be treated with kindness (even if they’re wrong, or use a Linux distro you don’t like). Personal attacks will not be tolerated.

Subcommunities on Beehaw:


This community's icon was made by Aaron Schneider, under the CC-BY-NC-SA 4.0 license.

founded 3 years ago
MODERATORS