CVE-2018-5702
Published: 15 January 2018
Transmission through 2.92 relies on X-Transmission-Session-Id (which is not a forbidden header for Fetch) for access control, which allows remote attackers to execute arbitrary RPC commands, and consequently write to arbitrary files, via POST requests to /transmission/rpc in conjunction with a DNS rebinding attack.
Priority
Status
Package | Release | Status |
---|---|---|
transmission Launchpad, Ubuntu, Debian |
artful |
Released
(2.92-2ubuntu3.1)
|
trusty |
Released
(2.82-1.1ubuntu3.2)
|
|
upstream |
Needs triage
|
|
xenial |
Released
(2.84-3ubuntu3.1)
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 8.8 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | Required |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
References
- http://www.openwall.com/lists/oss-security/2018/01/12/1
- https://github.com/transmission/transmission/pull/468
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1447
- https://twitter.com/taviso/status/951526615145566208
- https://ubuntu.com/security/notices/USN-3533-1
- https://www.cve.org/CVERecord?id=CVE-2018-5702
- NVD
- Launchpad
- Debian