Plex Server scans for wallets?

I think this is a totally different matter.
I am almost willing to bet that this user has put his whole local home network into ā€œList of IP addresses and networks that are allowed without authā€.
And his phone is connected to his home WiFi while doing this.
And he is now surprised that this does exactly what it says on the tin.

1 Like

Figured I would point it out just in case. Thanks for being quick!

:joy: oh … thanks very much

Ah, you mean this.

In my case 3 tokens were matching to previous. The other devices had received a new token.

Let me look into this and see if I can reproduce.

1 Like

Thanks for looking into this.
Have you any update for us?

Any updates on all this. I’ve disconnected my plex from web since mine had issues with files being accessed for external ips… (I dont give access and never have to anyone). Would be nice to hear officially if there was something compromised or if its ā€œstill being worked on evenā€. Been radio silent for some time.

Did anything get discovered here. Was strange to have so many have this happen early this year. I find it hard to believe it was account data from 2015 breech. My virus scanner caught plex trying to access something outside of the scan path, which alerted me to check log and see someone (external ip) using a token to do such action. I’ve never shared plex with anyone. This has made me very nervous to reactivate the remote access.

There were things discovered from this.

As a result, PMS was changed in 1.25.7 to be restrictive.

One sequence of events (example)

  1. long time user had not changed password since the breach.
  2. The unchanged password meant the PlexOnlineToken had not changed either.
  3. The targetted server was connected to, using that PlexOnlineToken, as if the actual owner using that breached password.
  4. (This is where the fault was) – The intruder set a non-media file as the video to preplay.
  5. The intruder would then play any video. The preplay would attempt to send the file. If user plex:plex had read access to that path then the file would be sent.
    (This is what causes virus scanners/etc to trigger).

PMS 1.25.7 established that all preplay files specified must be valid video files that PMS can read.

PMS 1.25.7 and above maintain this requirement

4 Likes

And adding to @ChuckPa here:

What the intruder also did, was disable logging, so we couldn’t see what was going on.
From PMS 1.25.7, it is now req, that when lowering log level, a PMS restart is needed

3 Likes

Payload matches this exactly.

This topic was automatically closed 90 days after the last reply. New replies are no longer allowed.