this post was submitted on 08 Sep 2025
787 points (99.5% liked)

Technology

74980 readers
2828 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
 

We have recently experienced a security incident that may potentially involve your Plex account information. We believe the actual impact of this incident is limited; however, action is required from you to ensure your account remains secure.

What happened

An unauthorized third party accessed a limited subset of customer data from one of our databases. While we quickly contained the incident, information that was accessed included emails, usernames, securely hashed passwords and authentication data.

Any account passwords that may have been accessed were securely hashed, in accordance with best practices, meaning they cannot be read by a third party. Out of an abundance of caution, we recommend you take some additional steps to secure your account (see details below). Rest assured that we do not store credit card data on our servers, so this information was not compromised in this incident.

What we’re doing

We’ve already addressed the method that this third party used to gain access to the system, and we’re undergoing additional reviews to ensure that the security of all of our systems is further strengthened to prevent future attacks.

What you must do

If you use a password to sign into Plex: We kindly request that you reset your Plex account password immediately by visiting https://plex.tv/reset. When doing so, there’s a checkbox to “Sign out connected devices after password change,” which we recommend you enable. This will sign you out of all your devices (including any Plex Media Server you own) for your security, and you will then need to sign back in with your new password.

If you use SSO to sign into Plex: We kindly request that you log out of all active sessions by visiting https://plex.tv/security and clicking the button that says ”Sign out of all devices”. This will sign you out of all your devices (including any Plex Media Server you own) for your security, and you will then need to sign back in as normal.

Additional Security Measures You Can Take

We remind you that no one at Plex will ever reach out to you over email to ask for a password or credit card number for payments. For further account protection, we also recommend enabling two-factor authentication on your Plex account if you haven’t already done so.

Lastly, we sincerely apologize for any inconvenience this situation may cause you. We take pride in our security systems, which helped us quickly detect this incident, and we want to assure you that we are working swiftly to prevent potential future incidents from occurring.

For step-by-step instructions on how to reset your password, visit:https://support.plex.tv/articles/account-requires-password-reset

you are viewing a single comment's thread
view the rest of the comments
[–] Saik0Shinigami@lemmy.saik0.com 19 points 1 day ago* (last edited 1 day ago) (41 children)

You don't even have to hack jellyfin though. Quite a few endpoints aren't behind authentication at all.

But that doesn't help your case so I'm sure you'll just downvote me.

Edit: For those who don't know. https://github.com/jellyfin/jellyfin/issues/5415

Several issues. Some require being logged in with any account (to get other user information on the server, including admin)... others are endpoints that let media access if you guess a guessable md5 hash(which is normalized in docker setups in general... and standardized by *arr setups. So highly guessable if you use these tools... which most of you are). The sort of thing that media companies will absolutely abuse eventually if they're not already doing it to collect proof that you're hosting their content illegally. But I just find it laughable that this is the answer... but ya'll are frothing at the mouth over plex leaking an email address... Oh no! not the email address you already get boatloads of spam at! However will you live!

I'm angry about both, yet still prefer Jellyfin. Why? I control everything about it. I self host it and can choose who has access (including putting it behind a VPN). I have the code so I can patch it if I choose. I can even disable the problematic endpoints of I'm fine with the repercussions.

With Plex, i have to live with their central servers. With Jellyfin, I don't, and it's much less likely a corpo comes after me specifically than happens to see something via a Plex compromise.

I think both are fine services, and I appreciate Plex's response here. I still prefer Jellyfin.

[–] daniskarma@lemmy.dbzer0.com 7 points 1 day ago (2 children)

While I whish access were secured at some point. I'm still yet to see one of those guessed hash attacks on the wild.

A good thing about Jellyfin is that we KNOW its insecurities because it's open source.

Other software may be insecure like that but you would only know after an incident happens because you cannot audit the source code.

Yup, and that's why I still use it despite its security issues. I run it in a rootless container, so even if there's some sort of breach, it should be contained.

load more comments (1 replies)
[–] priapus@piefed.social 12 points 1 day ago* (last edited 1 day ago) (1 children)

Endpoints that dont give you any data that would be considered a breach.

That unauthentic endpoint shit is so overblown. They should be authenticated and I hope it changes in the future, but its really not a serious issue. If they worry you, put the endpoints behind your own authentication through your reverse proxy.

[–] Saik0Shinigami@lemmy.saik0.com 9 points 1 day ago* (last edited 1 day ago) (1 children)

Complete access to your media without authentication isn't "don't give you any data".

Meanwhile you're all frothing at the mouth cause Plex leaked email addresses and encrypted passwords.

And you're correct. It's not a breach... because it wasn't protected to begin with.

Edit: You ninja edited your post... bad nettiquette.

put the endpoints behind your own authentication through your reverse proxy.

Breaks every app for jellyfin including tv apps. So no. that's not a valid answer.

Edit2: And I want to be clear about this... I don't simp for Plex I want off of the platform too... But Jellyfin in it's current state is a much worse security nightmare IMO. I can at least kill the plex relay binary and packet sniff it to know that it's not sharing data I don't want it to share. Jellyfin just lets everyone in that can guess a filepath (which you can "fix" by obfuscating it... but ask any security professional about that.) and somehow Jellyfin is the messiah? Devs ignoring a 5+ year old issue that already proof-of-concepted... is wild.

[–] priapus@piefed.social 12 points 1 day ago* (last edited 1 day ago) (1 children)

Complete access to your media without authentication isn't "don't give you any data".

The media on my server is not what I'd consider private data, it's just media. If someone wants to spend their time brute forcing randomized UUIDs to have a minuscule chance of viewing some media on my server, then I really couldn't care less. Especially since they're gonna get blocked by http probing detection after a few tries.

If someone could the emails and hashed passwords, then I would care about the spam I'd be constantly receiving after and the possibility of my friends and family's passwords being exposed, as not all of them use secure passwords (despite my best efforts to convince them to change that).

Simply put, if I was using Plex right now, this breach would impact the many family members and friends using my server, something I'd feel guilty about. Meanwhile, with Jellyfin, none of these concerns would have any effect on them.

Edit: You ninja edited your post... bad nettiquette.

I edited it right after posting because I accidentally clicked post. Didn't think you'd respond that fast.

Meanwhile you're all frothing at the mouth cause Plex leaked email addresses and encrypted passwords.

This was my only comment in the thread. Kinda feels like your reply here is taking out your frustration with this entire thread on my reply.

put the endpoints behind your own authentication through your reverse proxy.

Breaks every app for jellyfin including tv apps. So no. that's not a valid answer.

I assumed you were talking about stuff besides media playback. There are other endpoints that can be secure using your reverse proxy without breaking any apps.

Jellyfin just lets everyone in that can guess a filepath

That's not how the endpoint works. It is a randomized UUID.

Depending on your security posture, this may be an issue for you. It is not for me, and likely is not for many other users. My media is not sensitive information. My email and other identification info is.

Edit: formatting

[–] Saik0Shinigami@lemmy.saik0.com 5 points 1 day ago* (last edited 1 day ago) (15 children)

That’s not how the endpoint works. It is a randomized UUID.

It's not. It's an MD5 of the filepath. UUIDs are generic and random, not specifically tied to something.

https://github.com/search?q=repo%3Ajellyfin%2Fjellyfin+md5&type=code

If you do a basic search, you'll find that most api endpoint generated values are simply md5 of the filepath. And they just call this a GUID in the code... it's not. It's completely determinable. And the problem with this is expounded considerably if you use a default docker config (so folder path is known) and an *arr stack (so filenames get standardized). How many people modify these things significantly? Pre-hash a few permutations and just check away... Get someone like Sony (who've installed rootkits on people's computer before... so they don't give a shit), and now you could find yourself in court.

https://github.com/jellyfin/jellyfin/blob/3936fc9f253d15ae31afbdfe5fcf1684c441263c/Jellyfin.Api/Controllers/VideosController.cs#L315 is the api call itself. No auth.

Depending on your security posture

Is exactly the problem I have though with the evangelical preaching all about jellyfin here. I've brought this topic up probably about a half dozen times in the 2 years I've been on lemmy... and a while longer before on Reddit. DOZENS of people comment the same things you are... and get it completely wrong. And many more end up messaging me or responding that they had no idea this was an issue. Yet I continue to see people singing praises of Jellyfin! and how it must be so much more secure! When it completely isn't. So many people brush it off... then flip their shit about Plex doing something.

Especially since they’re gonna get blocked by http probing detection after a few tries.

If we're talking "mitigations". Plex is more secure by default... and if you want to get off their auth... you can access your network via VPN and set the VPN subnet as "local" so you don't have to do their auth. But at least plex doesn't just let unauthed people access whatever they can guess as a default out the box option. And certainly don't have any security issues sitting around for 5+ years waiting for a dev to do something about it.

Edit: forgot to finish a thought. Finished it.

Edit2:

This was my only comment in the thread. Kinda feels like your reply here is taking out your frustration with this entire thread on my reply.

Which immediately points to Jellyfin... as if it was "better" somehow. while downplaying the actual issue without actually reading what I'm complaining about

That unauthentic endpoint shit is so overblown.

Overblown if you have mitigations? Sure... but how many do? And why are we treating software that is taking actual actions to better security as "Worse" than something that can't clear a simple problem in 5+ years because devs don't want to "break compatibility".

Edit3: OH! forgot this as well... "well they'd need to know where to find servers before they can access them to check!" Yup.. hello shodan! https://www.shodan.io/search?query=jellyfin Would be trivial to make a script that does all of this and crawls shodan or other sources for domain/ip information. Hell you can probably just look up all LE certs issued that contain "jf" or "jellyfin" or other permutations of subdomains too. But shodan has a list of 11,788 when I check... that's not insignificant...

[–] priapus@piefed.social 2 points 1 day ago* (last edited 1 day ago) (1 children)

It's not. It's an MD5 of the filepath. UUIDs are generic and random, not specifically tied to something.

Fair enough, I was not aware of this, and I wish the developers made this more clear in the issue thread. This does not change my point that my media is not confidential data. I do agree that it should be by default, but a "breach" where someone accesses a piece of media from my server has no tangible impact on me or my server. A breach that includes my email and account information, absolutely does.

Depending on your security posture

Is exactly the problem I have though with the evangelical preaching all about jellyfin here. I've brought this topic up probably about a half dozen times in the 2 years I've been on lemmy... and a while longer before on Reddit. DOZENS of people comment the same things you are... and get it completely wrong. And many more end up messaging me or responding that they had no idea this was an issue. Yet I continue to see people singing praises of Jellyfin! and how it must be so much more secure! When it completely isn't. So many people brush it off... then flip their shit about Plex doing something.

I don't entirely understand what this response has to do with what I said. I'm surprised to hear you say that people praise Jellyfin as being far more secure than Plex, as I have not heard that. Security has nothing to do with why I use Jellyfin over Plex.

Overblown if you have mitigations? Sure... but how many do? And why are we treating software that is taking actual actions to better security as "Worse" than something that can't clear a simple problem in 5+ years because devs don't want to "break compatibility".

I feel it's overblown either way, as I don't believe the average user considers their media sensitive enough for it to be an issue. I'm not treating Plex as worse. Again, I'M NOT THE ONE WHO SAID ANY OF THAT. I am simply stating that in this specific instance, this Plex breach has a worse impact than the Jellyfin security concerns you bring up.

Which immediately points to Jellyfin... as if it was "better" somehow. while downplaying the actual issue without actually reading what I'm complaining about

My guy, I didn't start the comment thread, I'm not the one who brought up Jellyfin. I also believe I responded to every point I made, while you ignored many of mine. I don't know how you can say I'm not reading your comment. You're being very weirdly hostile when I'm just trying to have a conversation. I don't have significant stakes in either Plex or Jellyfin. I do prefer one, but I don't give a shit what others want to use.

Edit3: OH! forgot this as well... "well they'd need to know where to find servers before they can access them to check!" Yup.. hello shodan! https://www.shodan.io/search?query=jellyfin Would be trivial to make a script that does all of this and crawls shodan or other sources for domain/ip information. Hell you can probably just look up all LE certs issued that contain "jf" or "jellyfin" or other permutations of subdomains too. But shodan has a list of 11,788 when I check... that's not insignificant...

Just want to add that I'm not some completely uninformed user. I have a career in cybersecurity, as well as a degree and plenty of certifications. When discussing a vulnerability, we need to consider the actual risk of a vulnerability, using its likelihood of being exploited and its potential impact. The likelihood of someone attempting to brute force media on my Jellyfin is practically nonexistent, as they have essentially nothing to gain. At best, they find an episode of a show or movie that they could find elsewhere. The impact of someone exploiting this vulnerability is also practically nothing. They would get a stream of the video, minutely impacting the performance of my server.

Again, to be clear, I AGREE with sharing this information. People should be aware of this when using Jellyfin. However, it is not an issue for the majority of users. It is also not anywhere near as bad as a breach of actual account information, data that actually is sensitive. I do not agree with framing it to look like using Jellyfin should be considered generally insecure.

Edit: minor phrasing adjustments

[–] Saik0Shinigami@lemmy.saik0.com 1 points 1 day ago (1 children)

I do agree that it should be by default, but a “breach” where someone accesses a piece of media from my server has no tangible impact on me or my server. A breach that includes my email and account information, absolutely does.

Until a media company like Sony scans your server for their content and serves you a summons... Then it will have a significant impact on you. And I doubt the content that Plex leaked actually has any meaningful impact at all. It sucks... and is bad... but shit happens and nothing is perfect. I'm much more trusting of a company that actually responds and fixes problems that gets reported than one that hides in the corner with finger in ears for 5+ years.

I don’t entirely understand what this response has to do with what I said. I’m surprised to hear you say that people praise Jellyfin as being far more secure than Plex, as I have not heard that. Security has nothing to do with why I use Jellyfin over Plex.

We're on a thread where Plex is being derided for a security problem... Where the principal comment I responded to says "Glad I'm on Jellyfin". This is an implicit "jellyfin doesn't have this problem, it's secure" statement. Otherwise there'd be no point or relevance to the comment for the topic at hand.

My guy, I didn’t start the comment thread, I’m not the one who brought up Jellyfin.

You wrote

Endpoints that dont give you any data that would be considered a breach.

You are perpetuating that Jellyfin is "secure" to use on the internet. I was directly referencing what you said. I'm not sure why you keep thinking I'm talking about something else.

Just want to add that I’m not a completely random user. I have a career in cybersecurity as well as a degree and plenty of certifications.

I'm a CISO. I hire people like you and give you your job. I'm also no "completely random" but playing the appeal to authority card is stupid on a random internet forum. If I were to leak content secured by the applications that I have security ownership of. I'd be completely fucking jacked. Leaking emails and password hashes are meaningless... emails are all well known and password hashes means I just force reset the entire userbase and move on. Plex's "leak" is annoying... but not actually sensitive at all. You should know this. It will take a significant amount of time for the bcrypt+salted+peppered passwords to actually be decrypted. There's LOTS of time to hash that out, this email is the start of that process.

Now if your media isn't worth securing... then why use authentication at all on Plex or JF? Why do you care about your account auth that protects your media if the media isn't worth protecting? Why is it your default stance that exposing the media is such a nonissue... that your more worried about the data that secures your media more than the actual security of the media?

When discussing a vulnerability, we need to consider the actual risk of a vulnerability, using its likelihood of being exploited and its potential impact. The likelihood of someone attempting to brute force media on my Jellyfin is practically nonexistent, as they have essentially nothing to gain.

Unless you're a media company like Sony, WB, or other company that actually has ownership rights of the IP that you're storing. Remember... Sony has done things like install rootkits on their consumers computers in order to stop piracy. Why do you think that they're above asking servers freely if they have their copyrighted content?

The impact isn't a technical one. but a legal one. And JF could close that door and keep the media confidential in of itself so that this is a non-issue all together but specifically won't because of "backwards compatibility". But somehow you trust them to make secure decisions elsewhere with your content?

[–] priapus@piefed.social 2 points 1 day ago* (last edited 1 day ago) (1 children)

If you believe the threat of a company scanning a Jellyfin server in an attempt to find copyrighted media is a realistic one, then that's fine. I do not.

your more worried about the data that secures your media more than the actual security of the media?

As I said previously, friends and family use my server. Many who are likely to fall for phishing attempts after their email is leaked in a breach like this. I believe the likelihood of them receiving a malicious email from an attacker pretending to be Plex after a breach is much higher than a company successfully scanning my server for copyrighted materials.

Edit:

Like I've said a few times. I agree that this should be changed. I do very much hope that Jellyfin does so, and I do feel that it's worth warning users about. I also still find Jellyfin to be a better option for me than Plex. My own risk tolerance allows for the incredibly tiny possibility a company successfully finds media on my server.

There is no point in continuing this discussion, as we simply disagree, and that is not going to change here.

So now your users could be phished by a Plex phish... which gets the attacker access to your plex instance upon success? But you already said that you don't find that worth securing since in JF it's not secure by default... I'm fully not understanding here. Is the worry that your users are reusing passwords?

Any user for your system getting an actual phish for plex will at worst get a request to pay for something. Of which I bet they'd talk to you about it as the server owner first since I doubt anyone would want to pay for something you've given them for free.

I'm not seeing the risk here. Want to expound on that? I can clearly see the risk of direct media access if copyright holders start making random claims for things they find on default insecure servers.

load more comments (14 replies)
[–] rimjob_rainer@discuss.tchncs.de 9 points 1 day ago* (last edited 1 day ago) (2 children)

Don't expose jellyfin to the internet and it won't be hacked. But you are forced to make a Plex account, if you want to use Plex.

[–] Saik0Shinigami@lemmy.saik0.com 8 points 1 day ago (11 children)

Don't expose Jellyfin and you don't have a competitor program that does what Plex does... stop recommending it as a replacement if it's not a replacement. And this is ignoring that it's recommended to expose to the internet on their own documents.

But you are forced to make a Plex account, if you want to use it.

You've missed the point. You can't be mad at plex for taking action and closing security gaps after becoming aware of them... then in the same breath recommend a service that can't even be on the internet because it's so poorly secured.

load more comments (11 replies)
[–] Auli@lemmy.ca 2 points 1 day ago

So how are they hacking you? I mean I don't see those issues as really bad. Should it be fixed yes can anyone really do anything bit that I can see. Am I missing something.

load more comments (36 replies)