CVE-2018-5702
Summary
| CVE | CVE-2018-5702 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2018-01-15 16:29:00 UTC |
| Updated | 2019-10-03 00:03:00 UTC |
| Description | Transmission through 2.92 relies on X-Transmission-Session-Id (which is not a forbidden header for Fetch) for access control, which allows remote attackers to execute arbitrary RPC commands, and consequently write to arbitrary files, via POST requests to /transmission/rpc in conjunction with a DNS rebinding attack. |
Risk And Classification
Problem Types: NVD-CWE-noinfo
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Debian | Debian Linux | 7.0 | All | All | All |
| Operating System | Debian | Debian Linux | 8.0 | All | All | All |
| Operating System | Debian | Debian Linux | 9.0 | All | All | All |
| Operating System | Debian | Debian Linux | 7.0 | All | All | All |
| Operating System | Debian | Debian Linux | 8.0 | All | All | All |
| Operating System | Debian | Debian Linux | 9.0 | All | All | All |
| Application | Transmissionbt | Transmission | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Tavis Ormandy en Twitter: "First of a few remote code execution flaws in various popular torrent clients, here is a DNS rebinding vulnerability Transmission, resulting in arbitrary remote code execution. https://t.co/kAv9eWfXlG" | MISC | twitter.com | Third Party Advisory |
| Transmission - RPC DNS Rebinding | EXPLOIT-DB | www.exploit-db.com | Exploit, Third Party Advisory, VDB Entry |
| CVE-2018-5702: Mitigate dns rebinding attacks against daemon by taviso · Pull Request #468 · transmission/transmission · GitHub | MISC | github.com | Exploit, Technical Description, Third Party Advisory |
| Debian -- Security Information -- DSA-4087-1 transmission | DEBIAN | www.debian.org | Third Party Advisory |
| 1447 - transmission: rpc session-id mechanism design flaw - project-zero - Monorail | MISC | bugs.chromium.org | Exploit, Issue Tracking, Technical Description, Third Party Advisory |
| [SECURITY] [DLA 1246-1] transmission security update | MLIST | lists.debian.org | Mailing List, Third Party Advisory |
| Transmission: Remote code execution (GLSA 201806-07) — Gentoo Security | GENTOO | security.gentoo.org | Third Party Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 710265 Gentoo Linux Transmission Remote code execution Vulnerability (GLSA 201806-07)