CVE-2018-5702 log
| Source |
|
| Severity | High |
| Remote | Yes |
| Type | Arbitrary command execution |
| Description | The transmission-daemon in Transmission before 2.93 relies on X-Transmission-Session-Id (which is not a forbidden header for Fetch) for access control, which allows remote attackers to execute arbitrary RPC commands, and consequently write to arbitrary files, via POST requests to /transmission/rpc in conjunction with a DNS rebinding attack. |
| Group | Package | Affected | Fixed | Severity | Status | Ticket |
|---|---|---|---|---|---|---|
| AVG-588 | transmission-cli | 2.92-7 | 2.92-8 | High | Fixed | FS#57086 |
| Date | Advisory | Group | Package | Severity | Type |
|---|---|---|---|---|---|
| 17 Jan 2018 | ASA-201801-13 | AVG-588 | transmission-cli | High | arbitrary command execution |