Collection of potential security issues in Jellyfin This is a non exhaustive list of potential security issues found in Jellyfin. Some of these might cause controversy. Some of these are design fla…

  • Link@rentadrunk.org
    link
    fedilink
    arrow-up
    9
    ·
    2 days ago

    How is someone meant to guess what seems to be a randomly generated id? If they try to brute force it then you could probably set up something like fail2ban to block them after a few failed attempts.

    I’m not saying video ids shouldn’t require authentication, they should but the risk of someone getting the video id seems fairly low.

    • Scary le Poo@beehaw.orgOP
      link
      fedilink
      arrow-up
      4
      ·
      edit-2
      2 days ago

      It isn’t randomly generated. If you read through you would have known that.

      Also, Rainbow tables.

      tldr, Rainbow tables are precomputed lists of hashed values used to crack password hashes quickly. Instead of hashing each password guess on the fly, attackers use these tables to reverse hashes and find the original passwords faster, especially for weak or common ones. They’re less effective against hashes protected by a unique salt.

      • i_am_not_a_robot@discuss.tchncs.de
        link
        fedilink
        English
        arrow-up
        15
        ·
        2 days ago

        If the ID is the MD5 of the path, rainbow tables are completely useless. You don’t have the hash. You need to derive the hash by guessing the path to an existing file, for each file.