# Emby Server 代理头文件欺骗漏洞
## 概述
Emby Server 是一款用户可自行安装的家庭媒体服务器。该漏洞可能会允许攻击者获得对 Emby Server 系统的管理访问权限,具体情况取决于用户的账户设置。通过伪造某些预期与反向代理服务器交互的标头,攻击者可能可以影响本地/非本地网络判定,从而实现无密码登录或查看可能未设置密码的用户账户列表。
## 影响版本
- Emby Server Beta 版本 4.8.31 以下
- Emby Server 版本 4.7.12 以下
## 细节
该漏洞可通过仿冒与反向代理服务器交互的特定标头实现,从而影响对本地和非本地网络的判定。这使得攻击者有可能无需密码即可登录,或者查看可能未配置密码的用户账户列表。
## 影响
受到影响的是所有公开可访问的 Emby Server 系统且管理员未对管理用户登录配置进行增强防护的系统。该漏洞已在 Emby Server Beta 版本 4.8.31 和 Emby Server 版本 4.7.12 中修复。
是否为 Web 类漏洞: 是
判断理由:
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | Emby Server is a user-installable home media server which stores and organizes a user's media files of virtually any format and makes them available for viewing at home and abroad on a broad range of client devices. This vulnerability may allow administrative access to an Emby Server system, depending on certain user account settings. By spoofing certain headers which are intended for interoperation with reverse proxy servers, it may be possible to affect the local/non-local network determination to allow logging in without password or to view a list of user accounts which may have no password configured. Impacted are all Emby Server system which are publicly accessible and where the administrator hasn't tightened the account login configuration for administrative users. This issue has been patched in Emby Server Beta version 4.8.31 and Emby Server version 4.7.12. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2023/CVE-2023-33193.yaml | POC详情 |
暂无评论