Description
Transmission through 2.92 relies on X-Transmission-Session-Id (which is not a forbidden header for Fetch) for access control, which allows remote attackers to execute arbitrary RPC commands, and consequently write to arbitrary files, via POST requests to /transmission/rpc in conjunction with a DNS rebinding attack.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1246-1 | transmission security update |
Ubuntu USN |
USN-3533-1 | Transmission vulnerability |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T05:40:51.206Z
Reserved: 2018-01-15T00:00:00.000Z
Link: CVE-2018-5702
No data.
Status : Modified
Published: 2018-01-15T16:29:00.237
Modified: 2024-11-21T04:09:12.163
Link: CVE-2018-5702
No data.
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
Ubuntu USN