Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-5702

Опубликовано: 15 янв. 2018
Источник: debian

Описание

Transmission through 2.92 relies on X-Transmission-Session-Id (which is not a forbidden header for Fetch) for access control, which allows remote attackers to execute arbitrary RPC commands, and consequently write to arbitrary files, via POST requests to /transmission/rpc in conjunction with a DNS rebinding attack.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
transmissionfixed2.92-3package

Примечания

  • https://www.openwall.com/lists/oss-security/2018/01/12/1

  • https://github.com/transmission/transmission/pull/468

  • Proposed patch: https://patch-diff.githubusercontent.com/raw/transmission/transmission/pull/468.diff

  • https://bugs.chromium.org/p/project-zero/issues/detail?id=1447

Связанные уязвимости

CVSS3: 8.8
ubuntu
около 8 лет назад

Transmission through 2.92 relies on X-Transmission-Session-Id (which is not a forbidden header for Fetch) for access control, which allows remote attackers to execute arbitrary RPC commands, and consequently write to arbitrary files, via POST requests to /transmission/rpc in conjunction with a DNS rebinding attack.

CVSS3: 8.8
nvd
около 8 лет назад

Transmission through 2.92 relies on X-Transmission-Session-Id (which is not a forbidden header for Fetch) for access control, which allows remote attackers to execute arbitrary RPC commands, and consequently write to arbitrary files, via POST requests to /transmission/rpc in conjunction with a DNS rebinding attack.

CVSS3: 8.8
github
больше 3 лет назад

Transmission through 2.92 relies on X-Transmission-Session-Id (which is not a forbidden header for Fetch) for access control, which allows remote attackers to execute arbitrary RPC commands, and consequently write to arbitrary files, via POST requests to /transmission/rpc in conjunction with a DNS rebinding attack.