SABnzbd 2.3.9 and 3.0.0Alpha2 has a command injection vulnerability in the web configuration interface that permits an authenticated user to execute arbitrary Python commands on the underlying operating system.
References
Link | Resource |
---|---|
https://github.com/sabnzbd/sabnzbd/commits/develop | Patch Third Party Advisory |
https://github.com/sabnzbd/sabnzbd/security/advisories/GHSA-9x87-96gg-33w2 | Patch Third Party Advisory |
https://sabnzbd.org/downloads | Product Vendor Advisory |
https://github.com/sabnzbd/sabnzbd/commits/develop | Patch Third Party Advisory |
https://github.com/sabnzbd/sabnzbd/security/advisories/GHSA-9x87-96gg-33w2 | Patch Third Party Advisory |
https://sabnzbd.org/downloads | Product Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 05:00
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/sabnzbd/sabnzbd/commits/develop - Patch, Third Party Advisory | |
References | () https://github.com/sabnzbd/sabnzbd/security/advisories/GHSA-9x87-96gg-33w2 - Patch, Third Party Advisory | |
References | () https://sabnzbd.org/downloads - Product, Vendor Advisory |
Information
Published : 2020-08-11 16:15
Updated : 2024-11-21 05:00
NVD link : CVE-2020-13124
Mitre link : CVE-2020-13124
CVE.ORG link : CVE-2020-13124
JSON object : View
Products Affected
sabnzbd
- sabnzbd
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')