Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2023-30801

Опубликовано: 10 окт. 2023
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS3: 9.8

Описание

All versions of the qBittorrent client through 4.5.5 use default credentials when the web user interface is enabled. The administrator is not forced to change the default credentials. As of 4.5.5, this issue has not been fixed. A remote attacker can use the default credentials to authenticate and execute arbitrary operating system commands using the "external program" feature in the web user interface. This was reportedly exploited in the wild in March 2023.

РелизСтатусПримечание
bionic

ignored

end of standard support
devel

needs-triage

esm-apps/bionic

needs-triage

esm-apps/focal

needs-triage

esm-apps/jammy

needs-triage

esm-apps/noble

needs-triage

esm-apps/xenial

needs-triage

focal

ignored

end of standard support, was needs-triage
jammy

needs-triage

lunar

ignored

end of life, was needs-triage

Показывать по

EPSS

Процентиль: 72%
0.00728
Низкий

9.8 Critical

CVSS3

Связанные уязвимости

CVSS3: 9.8
nvd
около 2 лет назад

All versions of the qBittorrent client through 4.5.5 use default credentials when the web user interface is enabled. The administrator is not forced to change the default credentials. As of 4.5.5, this issue has not been fixed. A remote attacker can use the default credentials to authenticate and execute arbitrary operating system commands using the "external program" feature in the web user interface. This was reportedly exploited in the wild in March 2023.

CVSS3: 9.8
debian
около 2 лет назад

All versions of the qBittorrent client through 4.5.5 use default crede ...

suse-cvrf
почти 2 года назад

Security update for libtorrent-rasterbar, qbittorrent

CVSS3: 9.8
redos
больше 1 года назад

Уязвимость qbittorrent

CVSS3: 9.8
github
около 2 лет назад

All versions of the qBittorrent client through 4.5.5 use default credentials when the web user interface is enabled. The administrator is not forced to change the default credentials. As of 4.5.5, this issue has not been fixed. A remote attacker can use the default credentials to authenticate and execute arbitrary operating system commands using the "external program" feature in the web user interface. This was reportedly exploited in the wild in March 2023.

EPSS

Процентиль: 72%
0.00728
Низкий

9.8 Critical

CVSS3