Plex is starting to enforce its new rules, which prevent users from remotely accessing a personal media server without a subscription fee.

If anyone needs it: https://jellyfin.org/

  • roofuskit@lemmy.world
    link
    fedilink
    English
    arrow-up
    16
    arrow-down
    8
    ·
    edit-2
    7 hours ago

    Jellyfin is notoriously full of security holes. It’s recommended to not expose it to the Internet. It’s also easy easier on Plex, at least until this bullshit, to have a random non-techie family member sign in to your Plex server from anywhere. I never liked Plex and never got into it, but I see why people used to prefer it.

    I think Emby is a good middle ground for people looking to jump ship from Plex. But I switched to jellyfin from my lifetime Emby sub because the plug-in community there feels dead and Emby development felt dead in the water.

      • roofuskit@lemmy.world
        link
        fedilink
        English
        arrow-up
        19
        arrow-down
        5
        ·
        edit-2
        7 hours ago

        It has several unsecured endpoints.

        https://github.com/jellyfin/jellyfin/issues/5415

        If you read the comments the devs know it’s a serious issue but don’t want to break backwards compatibility fixing them. Their solution for now is to warn people of the risks of exposing their instance to the Web. Which I don’t think they’re doing a great job of.

        • tyler@programming.dev
          link
          fedilink
          English
          arrow-up
          15
          arrow-down
          2
          ·
          7 hours ago

          Aside from most of those being “potential issues”, which weren’t proven, the rest are GETs of things that do not need to be secret, things like album art and list of installed plugins. Besides the one plugin issue, which was an actual security issue, which was fixed over a year and a half ago. https://github.com/jellyfin/jellyfin/pull/11436

          Contrast that with Plex which has numerous high severity CVEs that include things like remote code execution, directory traversal, and more.

          • Cocodapuf@lemmy.world
            link
            fedilink
            English
            arrow-up
            1
            ·
            16 minutes ago

            list of installed plugins.

            Yeah, as you said, that’s a pretty serious security issue. That’s a data leak that explicitly lays out the shape of your attack surface. It tells the attacker exactly what additional software your server is running and if any of it includes known vulnerabilities, the attacker now knows how to gain access.

        • warm@kbin.earth
          link
          fedilink
          arrow-up
          4
          arrow-down
          1
          ·
          7 hours ago

          Isn’t that the point of major version upgrades? To make breaking changes?

          • MaggiWuerze@feddit.org
            link
            fedilink
            English
            arrow-up
            3
            ·
            3 hours ago

            Its also possible for a webserver to offer two versions of an API. Add a new one that needs authentication, mark the old one as deprecated and add a checkbox to disable it. Then clients can update to use the secure one and if you use and unmaintained client you can enable the old insecure api