Lucene search

K
gentooGentoo FoundationGLSA-202312-11
HistoryDec 23, 2023 - 12:00 a.m.

SABnzbd: Remote Code Execution

2023-12-2300:00:00
Gentoo Foundation
security.gentoo.org
11
sabnzbd
remote code execution
vulnerability
cve
web interface
privileges
exploitation
internet
untrusted networks
authentication
upgrade
emerge
resolution

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

8.5 High

AI Score

Confidence

Low

0.022 Low

EPSS

Percentile

89.5%

Background

Free and easy binary newsreader with web interface.

Description

A vulnerability has been discovered in SABnzbd. Please review the CVE identifier referenced below for details.

Impact

A design flaw was discovered in SABnzbd that could allow remote code execution. Manipulating the Parameters setting in the Notification Script functionality allows code execution with the privileges of the SABnzbd process. Exploiting the vulnerabilities requires access to the web interface. Remote exploitation is possible if users exposed their setup to the internet or other untrusted networks without setting a username/password. By default SABnzbd is only accessible from localhost, with no authentication required for the web interface.

Workaround

There is no known workaround at this time.

Resolution

All SABnzbd users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=net-nntp/sabnzbd-4.0.2"
OSVersionArchitecturePackageVersionFilename
Gentooanyallnet-nntp/sabnzbd< 4.0.2UNKNOWN

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

8.5 High

AI Score

Confidence

Low

0.022 Low

EPSS

Percentile

89.5%