NZBGet 21.1 allows authenticated remote code execution because the unarchive programs (7za and unrar) preserve executable file permissions. An attacker with the Control capability can execute a file by setting the value of SevenZipCommand or UnrarCmd. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
References
Link | Resource |
---|---|
https://nzbget.net/download | Product |
https://sec.maride.cc/posts/nzbget/ | Exploit Third Party Advisory |
Configurations
History
01 Dec 2023, 17:48
Type | Values Removed | Values Added |
---|---|---|
First Time |
Nzbget
Nzbget nzbget |
|
CWE | NVD-CWE-noinfo | |
References | () https://sec.maride.cc/posts/nzbget/ - Exploit, Third Party Advisory | |
References | () https://nzbget.net/download - Product | |
CPE | cpe:2.3:a:nzbget:nzbget:21.1:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
22 Nov 2023, 22:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-11-22 22:15
Updated : 2024-08-02 22:15
NVD link : CVE-2023-49102
Mitre link : CVE-2023-49102
CVE.ORG link : CVE-2023-49102
JSON object : View
Products Affected
nzbget
- nzbget
CWE