CVE-2018-5702 log
Source |
|
Severity | High |
Remote | Yes |
Type | Arbitrary command execution |
Description | The transmission-daemon in Transmission before 2.93 relies on X-Transmission-Session-Id (which is not a forbidden header for Fetch) for access control, which allows remote attackers to execute arbitrary RPC commands, and consequently write to arbitrary files, via POST requests to /transmission/rpc in conjunction with a DNS rebinding attack. |
Group | Package | Affected | Fixed | Severity | Status | Ticket |
---|---|---|---|---|---|---|
AVG-588 | transmission-cli | 2.92-7 | 2.92-8 | High | Fixed | FS#57086 |
Date | Advisory | Group | Package | Severity | Type |
---|---|---|---|---|---|
17 Jan 2018 | ASA-201801-13 | AVG-588 | transmission-cli | High | arbitrary command execution |