[ASA-201801-13] transmission-cli: arbitrary command execution
anthraxx at archlinux.org
Thu Jan 18 22:36:16 UTC 2018
Arch Linux Security Advisory ASA-201801-13
Date : 2018-01-17
CVE-ID : CVE-2018-5702
Package : transmission-cli
Type : arbitrary command execution
Remote : Yes
Link : https://security.archlinux.org/AVG-588
The package transmission-cli before version 2.92-8 is vulnerable to
arbitrary command execution.
Upgrade to 2.92-8.
# pacman -Syu "transmission-cli>=2.92-8"
The problem has been fixed upstream but no release is available yet.
Enable authentication in the transmission-daemon using a strong
The transmission-daemon in Transmission before 2.93 relies on
X-Transmission-Session-Id (which is not a forbidden header for Fetch)
for access control, which allows remote attackers to execute arbitrary
RPC commands, and consequently write to arbitrary files, via POST
requests to /transmission/rpc in conjunction with a DNS rebinding
A remote attacker is able to execute arbitrary RPC commands and
consequently write to arbitrary files by tricking a user into visiting
a malicious website.
-------------- next part --------------
A non-text attachment was scrubbed...
Size: 866 bytes
Desc: OpenPGP digital signature
More information about the arch-security