The web interface plugin in KTorrent before 3.1.4 allows remote attackers to bypass intended access restrictions and upload arbitrary torrent files, and trigger the start of downloads and seeding, via a crafted HTTP POST request.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
http://openwall.com/lists/oss-security/2009/01/08/1 | mailing list |
http://www.securityfocus.com/bid/31927 | vdb entry |
http://www.ubuntu.com/usn/USN-711-1 | vendor advisory |
http://secunia.com/advisories/32447 | third party advisory vendor advisory |
http://secunia.com/advisories/32442 | third party advisory vendor advisory |
http://secunia.com/advisories/34003 | third party advisory |
http://security.gentoo.org/glsa/glsa-200902-05.xml | vendor advisory |
https://bugs.gentoo.org/show_bug.cgi?id=244741 | |
http://secunia.com/advisories/33675 | third party advisory |
http://ktorrent.org/?q=node/23 | vendor advisory |
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=504178 | |
http://www.vupen.com/english/advisories/2008/2911 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/46117 | vdb entry |