ASA-201801-13 generated external raw

[ASA-201801-13] transmission-cli: arbitrary command execution
Arch Linux Security Advisory ASA-201801-13 ========================================== Severity: High Date : 2018-01-17 CVE-ID : CVE-2018-5702 Package : transmission-cli Type : arbitrary command execution Remote : Yes Link : Summary ======= The package transmission-cli before version 2.92-8 is vulnerable to arbitrary command execution. Resolution ========== Upgrade to 2.92-8. # pacman -Syu "transmission-cli>=2.92-8" The problem has been fixed upstream but no release is available yet. Workaround ========== Enable authentication in the transmission-daemon using a strong password. Description =========== The transmission-daemon in Transmission before 2.93 relies on X-Transmission-Session-Id (which is not a forbidden header for Fetch) for access control, which allows remote attackers to execute arbitrary RPC commands, and consequently write to arbitrary files, via POST requests to /transmission/rpc in conjunction with a DNS rebinding attack. Impact ====== A remote attacker is able to execute arbitrary RPC commands and consequently write to arbitrary files by tricking a user into visiting a malicious website. References ==========