Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2023-30801

Опубликовано: 10 окт. 2023
Источник: ubuntu
Приоритет: medium
CVSS3: 9.8

Описание

All versions of the qBittorrent client through 4.5.5 use default credentials when the web user interface is enabled. The administrator is not forced to change the default credentials. As of 4.5.5, this issue has not been fixed. A remote attacker can use the default credentials to authenticate and execute arbitrary operating system commands using the "external program" feature in the web user interface. This was reportedly exploited in the wild in March 2023.

РелизСтатусПримечание
bionic

ignored

end of standard support
devel

needs-triage

esm-apps/bionic

needs-triage

esm-apps/focal

needs-triage

esm-apps/jammy

needs-triage

esm-apps/noble

needs-triage

esm-apps/xenial

needs-triage

focal

ignored

end of standard support, was needs-triage
jammy

needs-triage

lunar

ignored

end of life, was needs-triage

Показывать по

9.8 Critical

CVSS3

Связанные уязвимости

CVSS3: 9.8
nvd
больше 1 года назад

All versions of the qBittorrent client through 4.5.5 use default credentials when the web user interface is enabled. The administrator is not forced to change the default credentials. As of 4.5.5, this issue has not been fixed. A remote attacker can use the default credentials to authenticate and execute arbitrary operating system commands using the "external program" feature in the web user interface. This was reportedly exploited in the wild in March 2023.

CVSS3: 9.8
debian
больше 1 года назад

All versions of the qBittorrent client through 4.5.5 use default crede ...

suse-cvrf
больше 1 года назад

Security update for libtorrent-rasterbar, qbittorrent

CVSS3: 9.8
redos
около 1 года назад

Уязвимость qbittorrent

CVSS3: 9.8
github
больше 1 года назад

All versions of the qBittorrent client through 4.5.5 use default credentials when the web user interface is enabled. The administrator is not forced to change the default credentials. As of 4.5.5, this issue has not been fixed. A remote attacker can use the default credentials to authenticate and execute arbitrary operating system commands using the "external program" feature in the web user interface. This was reportedly exploited in the wild in March 2023.

9.8 Critical

CVSS3