In qBittorrent before 4.1.7, the function Application::runExternalProgram() located in app/application.cpp allows command injection via shell metacharacters in the torrent name parameter or current tracker parameter, as demonstrated by remote command execution via a crafted name within an RSS feed.
References
Configurations
History
21 Nov 2024, 04:25
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
References | () http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00080.html - | |
References | () http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00085.html - | |
References | () https://github.com/qbittorrent/qBittorrent/issues/10925 - Exploit, Issue Tracking, Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5T4XAX2VUI4WMAS5AI4OE3OEQSQCDCF5/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OH3WYCKODG4OKMC4S6PWHLHAWWU6ORNC/ - | |
References | () https://www.debian.org/security/2020/dsa-4650 - |
07 Nov 2023, 03:03
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2019-07-17 22:15
Updated : 2024-11-21 04:25
NVD link : CVE-2019-13640
Mitre link : CVE-2019-13640
CVE.ORG link : CVE-2019-13640
JSON object : View
Products Affected
qbittorrent
- qbittorrent
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')