vulnerability
Arch Linux: Arbitrary command execution (CVE-2018-5702)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 7 | (AV:N/AC:M/Au:N/C:P/I:P/A:P) | Jan 15, 2018 | Jul 11, 2025 | Nov 27, 2025 |
Severity
7
CVSS
(AV:N/AC:M/Au:N/C:P/I:P/A:P)
Published
Jan 15, 2018
Added
Jul 11, 2025
Modified
Nov 27, 2025
Description
The transmission-daemon in Transmission before 2.93 relies on X-Transmission-Session-Id (which is not a forbidden header for Fetch) for access control, which allows remote attackers to execute arbitrary RPC commands, and consequently write to arbitrary files, via POST requests to /transmission/rpc in conjunction with a DNS rebinding attack.
Solution
arch-linux-upgrade-latest
References
- CVE-2018-5702
- https://attackerkb.com/topics/CVE-2018-5702
- URL-https://bugs.chromium.org/p/project-zero/issues/detail?id=1447
- URL-https://github.com/transmission/transmission/pull/468
- URL-https://lists.debian.org/debian-lts-announce/2018/01/msg00020.html
- URL-https://security.archlinux.org/ASA-201801-13
- URL-https://security.gentoo.org/glsa/201806-07
- URL-https://twitter.com/taviso/status/951526615145566208
- URL-https://www.debian.org/security/2018/dsa-4087
- URL-https://www.exploit-db.com/exploits/43665/
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.