Plex Media Server contains several vulnerabilities which may allow for remote code execution, information disclosure, and cross-site request forgery.
Plex Media Server 0.9.9.10 and possibly other versions
No Exploit Available
Remote Code Execution
This is a remote code execution vulnerability, specifically via man-in-the-middle attack. Plex gets "App" code via plaintext protocols, such as HTTP, which may allow an attacker to perform man-in-the-middle attacks to replace code with a malicious payload, which Plex will then execute. This may allow a remote attacker on the same network as the target to execute arbitrary code within the context of Plex.
Cross-site Request Forgery
Plex does not validate HTTP requests, which may be exploited by an attacker via a specially crafted webpage, when targeting an already logged-in administrative user.
Python stack traces are included in some requests, possibly allowing an attacker to siphon information about the target operating system and file locations. This information may be leveraged as part of a larger attack.
BeyondTrust Prevention and Detection:
BeyondTrust's Retina® Network Security Scanner scans devices to detect for this vulnerability.
- 33847 - Plex Media Server 0.9.9.7.429 and Prior (Zero-Day)
No mitigations are currently available.