Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2023-30801

Опубликовано: 10 окт. 2023
Источник: debian
EPSS Низкий

Описание

All versions of the qBittorrent client through 4.5.5 use default credentials when the web user interface is enabled. The administrator is not forced to change the default credentials. As of 4.5.5, this issue has not been fixed. A remote attacker can use the default credentials to authenticate and execute arbitrary operating system commands using the "external program" feature in the web user interface. This was reportedly exploited in the wild in March 2023.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
qbittorrentunfixedpackage

Примечания

  • https://github.com/qbittorrent/qBittorrent/issues/18731

  • https://github.com/qbittorrent/qBittorrent/pull/18735

  • README.Debian documents that quite clearly for the headless -nox version

  • When merged, the patches could still be backported as hardening, but

  • there's no need to treat this as a vulnerability by itself

EPSS

Процентиль: 72%
0.00728
Низкий

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 2 лет назад

All versions of the qBittorrent client through 4.5.5 use default credentials when the web user interface is enabled. The administrator is not forced to change the default credentials. As of 4.5.5, this issue has not been fixed. A remote attacker can use the default credentials to authenticate and execute arbitrary operating system commands using the "external program" feature in the web user interface. This was reportedly exploited in the wild in March 2023.

CVSS3: 9.8
nvd
больше 2 лет назад

All versions of the qBittorrent client through 4.5.5 use default credentials when the web user interface is enabled. The administrator is not forced to change the default credentials. As of 4.5.5, this issue has not been fixed. A remote attacker can use the default credentials to authenticate and execute arbitrary operating system commands using the "external program" feature in the web user interface. This was reportedly exploited in the wild in March 2023.

suse-cvrf
около 2 лет назад

Security update for libtorrent-rasterbar, qbittorrent

CVSS3: 9.8
github
больше 2 лет назад

All versions of the qBittorrent client through 4.5.5 use default credentials when the web user interface is enabled. The administrator is not forced to change the default credentials. As of 4.5.5, this issue has not been fixed. A remote attacker can use the default credentials to authenticate and execute arbitrary operating system commands using the "external program" feature in the web user interface. This was reportedly exploited in the wild in March 2023.

CVSS3: 9.8
fstec
больше 2 лет назад

Уязвимость кросс-платформенный BitTorrent клиента qBittorrent, связанная с использованием жестко запрограммированных учетных данных, позволяющая нарушителю выполнить произвольные команды

EPSS

Процентиль: 72%
0.00728
Низкий