6.8 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
0.017 Low
EPSS
Percentile
87.7%
Transmission through 2.92 relies on X-Transmission-Session-Id (which is not
a forbidden header for Fetch) for access control, which allows remote
attackers to execute arbitrary RPC commands, and consequently write to
arbitrary files, via POST requests to /transmission/rpc in conjunction with
a DNS rebinding attack.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 17.10 | noarch | transmission | < 2.92-2ubuntu3.1 | UNKNOWN |
ubuntu | 14.04 | noarch | transmission | < 2.82-1.1ubuntu3.2 | UNKNOWN |
ubuntu | 16.04 | noarch | transmission | < 2.84-3ubuntu3.1 | UNKNOWN |
www.openwall.com/lists/oss-security/2018/01/12/1
bugs.chromium.org/p/project-zero/issues/detail?id=1447
github.com/transmission/transmission/pull/468
launchpad.net/bugs/cve/CVE-2018-5702
nvd.nist.gov/vuln/detail/CVE-2018-5702
security-tracker.debian.org/tracker/CVE-2018-5702
twitter.com/taviso/status/951526615145566208
ubuntu.com/security/notices/USN-3533-1
www.cve.org/CVERecord?id=CVE-2018-5702
6.8 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
0.017 Low
EPSS
Percentile
87.7%