ASA-201801-13 log original external raw
[ASA-201801-13] transmission-cli: arbitrary command execution |
---|
Arch Linux Security Advisory ASA-201801-13
==========================================
Severity: High
Date : 2018-01-17
CVE-ID : CVE-2018-5702
Package : transmission-cli
Type : arbitrary command execution
Remote : Yes
Link : https://security.archlinux.org/AVG-588
Summary
=======
The package transmission-cli before version 2.92-8 is vulnerable to
arbitrary command execution.
Resolution
==========
Upgrade to 2.92-8.
# pacman -Syu "transmission-cli>=2.92-8"
The problem has been fixed upstream but no release is available yet.
Workaround
==========
Enable authentication in the transmission-daemon using a strong
password.
Description
===========
The transmission-daemon in Transmission before 2.93 relies on
X-Transmission-Session-Id (which is not a forbidden header for Fetch)
for access control, which allows remote attackers to execute arbitrary
RPC commands, and consequently write to arbitrary files, via POST
requests to /transmission/rpc in conjunction with a DNS rebinding
attack.
Impact
======
A remote attacker is able to execute arbitrary RPC commands and
consequently write to arbitrary files by tricking a user into visiting
a malicious website.
References
==========
https://bugs.archlinux.org/task/57086
http://www.openwall.com/lists/oss-security/2018/01/12/1
https://bugs.chromium.org/p/project-zero/issues/detail?id=1447
https://github.com/transmission/transmission/commit/eb5d1a79cbe1b9bc5b22fdcc598694ecd4d02f43
https://github.com/transmission/transmission/pull/468
https://security.archlinux.org/CVE-2018-5702
|