Isn't that the point of major version upgrades? To make breaking changes?
Comment on Plex’s crackdown on free remote streaming access starts this week - Ars Technica
roofuskit@lemmy.world 3 weeks agoIt has several unsecured endpoints.
warm@kbin.earth 3 weeks ago
MaggiWuerze@feddit.org 3 weeks ago
Its also possible for a webserver to offer two versions of an API. Add a new one that needs authentication, mark the old one as deprecated and add a checkbox to disable it. Then clients can update to use the secure one and if you use and unmaintained client you can enable the old insecure api
tyler@programming.dev 3 weeks ago
Aside from most of those being “potential issues”, which weren’t proven, the rest are GETs of things that do not need to be secret, things like album art and list of installed plugins. Besides the one plugin issue, which was an actual security issue, which was fixed over a year and a half ago. github.com/jellyfin/jellyfin/pull/11436
Contrast that with Plex which has numerous high severity CVEs that include things like remote code execution, directory traversal, and more.
MaggiWuerze@feddit.org 3 weeks ago
And you think if Jellyfin were a comparable size, there wouldn’t be just as many or more?
tyler@programming.dev 2 weeks ago
No… because more people would be working on it.
Cocodapuf@lemmy.world 3 weeks ago
Yeah, as you said, that’s a pretty serious security issue. That’s a data leak that explicitly lays out the shape of your attack surface. It tells the attacker exactly what additional software your server is running and if any of it includes known vulnerabilities, the attacker now knows how to gain access.
tyler@programming.dev 2 weeks ago
That only works if the plugins are somehow accessible through an api controller, which as far as I’m aware, is not how jellyfin plugins work. So no, it wouldn’t increase your attack surface at all.
fartsparkles@lemmy.world 3 weeks ago
You’re aware those CVEs are only relevant for ancient versions of Plex and were fixed long ago?
tyler@programming.dev 2 weeks ago
They are not marked as resolved.
fartsparkles@lemmy.world 2 weeks ago
CVEs don’t get issued “resolved” statuses… They are either reserved, published, or rejected (technically NVD have a few extra for published). That’s just junk data in that tool you’re using. Use authoritative sources like cve.org or nvd.nist.gov.
You can see the CPEs on NVD and they’re old versions of Plex.
Mondez@lemdro.id 2 weeks ago
Those are the the ones that somone has managed to find in closed source software…