First published: Mon Jan 15 2018(Updated: )
Transmission through 2.92 relies on X-Transmission-Session-Id (which is not a forbidden header for Fetch) for access control, which allows remote attackers to execute arbitrary RPC commands, and consequently write to arbitrary files, via POST requests to /transmission/rpc in conjunction with a DNS rebinding attack.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/transmission | 2.94-2+deb10u2 3.00-1 3.00-2.1+deb12u1 4.0.2-1 | |
Transmissionbt Transmission | <=2.92 | |
Debian Debian Linux | =7.0 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-5702 is a vulnerability in Transmission through version 2.92 that allows remote attackers to execute arbitrary RPC commands and write to arbitrary files.
CVE-2018-5702 has a severity rating of 8.8 (high).
CVE-2018-5702 affects Transmission versions up to 2.92.
To fix CVE-2018-5702 in Transmission, update to version 2.94-2+deb10u2, 3.00-1, 3.00-2.1+deb12u1, or 4.0.2-1.
You can find more information about CVE-2018-5702 at the following references: [link1], [link2], [link3].