First published: Mon Nov 18 2019(Updated: )
Tautulli versions 2.1.38 and below allows remote attackers to bypass intended access control in Plex Media Server because the X-Plex-Token is mishandled and can be retrieved from Tautulli. NOTE: Initially, this id was associated with Plex Media Server 1.18.2.2029-36236cc4c as the affected product and version. Further research indicated that Tautulli is the correct affected product.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Plex Media Server | =1.18.2.2029-36236cc4c |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-21031 is medium with a severity value of 6.5.
Remote attackers can exploit CVE-2018-21031 by bypassing intended access control in Plex Media Server.
The X-Plex-Token can be retrieved from Tautulli in CVE-2018-21031.
Tautulli versions 2.1.38 and below are affected by CVE-2018-21031.
Yes, you can find references for CVE-2018-21031 at the following links: [1](https://forums.plex.tv/t/security-regarding-cve-2018-21031/493286), [2](https://twitter.com/GerardFuguet/status/1009937529573912576), [3](https://www.elladodelmal.com/2018/08/shodan-es-de-cine-hacking-tautulli-un.html).