Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2018-5702

Опубликовано: 15 янв. 2018
Источник: ubuntu
Приоритет: medium
EPSS Средний
CVSS2: 6.8
CVSS3: 8.8

Описание

Transmission through 2.92 relies on X-Transmission-Session-Id (which is not a forbidden header for Fetch) for access control, which allows remote attackers to execute arbitrary RPC commands, and consequently write to arbitrary files, via POST requests to /transmission/rpc in conjunction with a DNS rebinding attack.

РелизСтатусПримечание
artful

released

2.92-2ubuntu3.1
devel

released

2.92-3ubuntu1
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was released [2.82-1.1ubuntu3.2]]
esm-infra/xenial

released

2.84-3ubuntu3.1
precise/esm

DNE

trusty

released

2.82-1.1ubuntu3.2
trusty/esm

DNE

trusty was released [2.82-1.1ubuntu3.2]
upstream

needs-triage

xenial

released

2.84-3ubuntu3.1

Показывать по

EPSS

Процентиль: 96%
0.27224
Средний

6.8 Medium

CVSS2

8.8 High

CVSS3

Связанные уязвимости

CVSS3: 8.8
nvd
около 8 лет назад

Transmission through 2.92 relies on X-Transmission-Session-Id (which is not a forbidden header for Fetch) for access control, which allows remote attackers to execute arbitrary RPC commands, and consequently write to arbitrary files, via POST requests to /transmission/rpc in conjunction with a DNS rebinding attack.

CVSS3: 8.8
debian
около 8 лет назад

Transmission through 2.92 relies on X-Transmission-Session-Id (which i ...

CVSS3: 8.8
github
больше 3 лет назад

Transmission through 2.92 relies on X-Transmission-Session-Id (which is not a forbidden header for Fetch) for access control, which allows remote attackers to execute arbitrary RPC commands, and consequently write to arbitrary files, via POST requests to /transmission/rpc in conjunction with a DNS rebinding attack.

EPSS

Процентиль: 96%
0.27224
Средний

6.8 Medium

CVSS2

8.8 High

CVSS3