First published: Thu Jan 15 2009(Updated: )
The web interface plugin in KTorrent before 3.1.4 allows remote attackers to bypass intended access restrictions and upload arbitrary torrent files, and trigger the start of downloads and seeding, via a crafted HTTP POST request.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
KTorrent | <=3.1.3 | |
KTorrent | =0.9 | |
KTorrent | =1.0 | |
KTorrent | =1.1 | |
KTorrent | =1.2 | |
KTorrent | =1.2-rc1 | |
KTorrent | =1.2-rc2 | |
KTorrent | =2.0 | |
KTorrent | =2.0-beta1 | |
KTorrent | =2.0-rc1 | |
KTorrent | =2.0.1 | |
KTorrent | =2.0.2 | |
KTorrent | =2.0.3 | |
KTorrent | =2.1 | |
KTorrent | =2.1-beta1 | |
KTorrent | =2.1-rc1 | |
KTorrent | =2.1.1 | |
KTorrent | =2.1.2 | |
KTorrent | =2.1.3 | |
KTorrent | =2.1.4 | |
KTorrent | =2.2 | |
KTorrent | =2.2-beta1 | |
KTorrent | =2.2-rc1 | |
KTorrent | =2.2.1 | |
KTorrent | =2.2.2 | |
KTorrent | =2.2.3 | |
KTorrent | =2.2.4 | |
KTorrent | =2.2.5 | |
KTorrent | =2.2.6 | |
KTorrent | =2.2.7 | |
KTorrent | =2.2.8 | |
KTorrent | =3.0-beta1 | |
KTorrent | =3.0-rc1 | |
KTorrent | =3.0.0 | |
KTorrent | =3.0.1 | |
KTorrent | =3.0.2 | |
KTorrent | =3.1.1 | |
KTorrent | =3.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-5905 has a medium severity rating due to its potential for unauthorized file uploads and execution of arbitrary torrent commands.
To fix CVE-2008-5905, upgrade KTorrent to version 3.1.4 or later, which contains the necessary security patches.
CVE-2008-5905 affects KTorrent versions prior to 3.1.4, including all versions below 3.1.4.
Yes, CVE-2008-5905 can be exploited remotely via a crafted HTTP POST request.
Successful exploitation of CVE-2008-5905 allows an attacker to upload arbitrary torrent files and start unauthorized downloads or seeding.