[ASA-201801-13] transmission-cli: arbitrary command execution
Levente Polyak
anthraxx at archlinux.org
Thu Jan 18 22:36:16 UTC 2018
Arch Linux Security Advisory ASA-201801-13
==========================================
Severity: High
Date : 2018-01-17
CVE-ID : CVE-2018-5702
Package : transmission-cli
Type : arbitrary command execution
Remote : Yes
Link : https://security.archlinux.org/AVG-588
Summary
=======
The package transmission-cli before version 2.92-8 is vulnerable to
arbitrary command execution.
Resolution
==========
Upgrade to 2.92-8.
# pacman -Syu "transmission-cli>=2.92-8"
The problem has been fixed upstream but no release is available yet.
Workaround
==========
Enable authentication in the transmission-daemon using a strong
password.
Description
===========
The transmission-daemon in Transmission before 2.93 relies on
X-Transmission-Session-Id (which is not a forbidden header for Fetch)
for access control, which allows remote attackers to execute arbitrary
RPC commands, and consequently write to arbitrary files, via POST
requests to /transmission/rpc in conjunction with a DNS rebinding
attack.
Impact
======
A remote attacker is able to execute arbitrary RPC commands and
consequently write to arbitrary files by tricking a user into visiting
a malicious website.
References
==========
https://bugs.archlinux.org/task/57086
http://www.openwall.com/lists/oss-security/2018/01/12/1
https://bugs.chromium.org/p/project-zero/issues/detail?id=1447
https://github.com/transmission/transmission/commit/eb5d1a79cbe1b9bc5b22fdcc598694ecd4d02f43
https://github.com/transmission/transmission/pull/468
https://security.archlinux.org/CVE-2018-5702
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 866 bytes
Desc: OpenPGP digital signature
URL: <https://lists.archlinux.org/pipermail/arch-security/attachments/20180118/c4ee578f/attachment.asc>
More information about the arch-security
mailing list