Security
Headlines
HeadlinesLatestCVEs

Headline

Gentoo Linux Security Advisory 202312-11

Gentoo Linux Security Advisory 202312-11 - A vulnerability has been found in SABnzbd which allows for remote code execution. Versions greater than or equal to 4.0.2 are affected.

Packet Storm
#vulnerability#web#mac#linux#rce#auth

Gentoo Linux Security Advisory GLSA 202312-11


                                       https://security.gentoo.org/  

Severity: High
Title: SABnzbd: Remote Code Execution
Date: December 23, 2023
Bugs: #908032
ID: 202312-11


Synopsis

A vulnerability has been found in SABnzbd which allows for remote code
execution.

Background

Free and easy binary newsreader with web interface.

Affected packages

Package Vulnerable Unaffected


net-nntp/sabnzbd < 4.0.2 >= 4.0.2

Description

A vulnerability has been discovered in SABnzbd. Please review the CVE
identifier referenced below for details.

Impact

A design flaw was discovered in SABnzbd that could allow remote code
execution. Manipulating the Parameters setting in the Notification
Script functionality allows code execution with the privileges of the
SABnzbd process. Exploiting the vulnerabilities requires access to the
web interface. Remote exploitation is possible if users exposed their
setup to the internet or other untrusted networks without setting a
username/password. By default SABnzbd is only accessible from
localhost, with no authentication required for the web interface.

Workaround

There is no known workaround at this time.

Resolution

All SABnzbd users should upgrade to the latest version:

emerge --sync

emerge --ask --oneshot --verbose “>=net-nntp/sabnzbd-4.0.2”

References

[ 1 ] CVE-2023-34237
https://nvd.nist.gov/vuln/detail/CVE-2023-34237

Availability

This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

https://security.gentoo.org/glsa/202312-11

Concerns?

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users’ machines is of utmost
importance to us. Any security concerns should be addressed to
[email protected] or alternatively, you may file a bug at
https://bugs.gentoo.org.

License

Copyright 2023 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

https://creativecommons.org/licenses/by-sa/2.5

Related news

CVE-2023-34237: SABnzbd - Wiki - General

SABnzbd is an open source automated Usenet download tool. A design flaw was discovered in SABnzbd that could allow remote code execution. Manipulating the Parameters setting in the Notification Script functionality allows code execution with the privileges of the SABnzbd process. Exploiting the vulnerabilities requires access to the web interface. Remote exploitation is possible if users[exposed their setup to the internet or other untrusted networks without setting a username/password. By default SABnzbd is only accessible from `localhost`, with no authentication required for the web interface. This issue has been patched in commits `e3a722` and `422b4f` which have been included in the 4.0.2 release. Users are advised to upgrade. Users unable to upgrade should ensure that a username and password have been set if their instance is web accessible.

Packet Storm: Latest News

NIELD (Network Interface Events Logging Daemon) 0.6.2