Vulnerability CVE-2008-5905


Published: 2009-01-15   Modified: 2012-02-12

Description:
The web interface plugin in KTorrent before 3.1.4 allows remote attackers to bypass intended access restrictions and upload arbitrary torrent files, and trigger the start of downloads and seeding, via a crafted HTTP POST request.

Type:

CWE-264

(Permissions, Privileges, and Access Controls)

CVSS2 => (AV:N/AC:M/Au:N/C:N/I:P/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
4.3/10
2.9/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
None
Partial
None
Affected software
Ktorrent -> Ktorrent 

 References:
https://bugs.gentoo.org/show_bug.cgi?id=244741
http://xforce.iss.net/xforce/xfdb/46117
http://www.vupen.com/english/advisories/2008/2911
http://www.ubuntu.com/usn/USN-711-1
http://www.securityfocus.com/bid/31927
http://security.gentoo.org/glsa/glsa-200902-05.xml
http://secunia.com/advisories/34003
http://secunia.com/advisories/33675
http://secunia.com/advisories/32447
http://secunia.com/advisories/32442
http://openwall.com/lists/oss-security/2009/01/08/1
http://ktorrent.org/?q=node/23
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=504178

Copyright 2024, cxsecurity.com

 

Back to Top