svn commit: r458952 - head/security/vuxml
Ben Woods
woodsb02 at FreeBSD.org
Sun Jan 14 02:19:48 UTC 2018
Author: woodsb02
Date: Sun Jan 14 02:19:47 2018
New Revision: 458952
URL: https://svnweb.freebsd.org/changeset/ports/458952
Log:
Document DNS rebinding vulnerabilities in net-p2p/transmission-daemon
PR: 225150
Security: https://www.vuxml.org/freebsd/3e5b8bd3-0c32-452f-a60e-beab7b762351.html
Modified:
head/security/vuxml/vuln.xml
Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml Sun Jan 14 02:04:54 2018 (r458951)
+++ head/security/vuxml/vuln.xml Sun Jan 14 02:19:47 2018 (r458952)
@@ -58,6 +58,45 @@ Notes:
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="3e5b8bd3-0c32-452f-a60e-beab7b762351">
+ <topic>transmission-daemon -- vulnerable to dns rebinding attacks</topic>
+ <affects>
+ <package>
+ <name>transmission-daemon</name>
+ <range><le>2.92_3</le></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Google Project Zero reports:</p>
+ <blockquote cite="https://bugs.chromium.org/p/project-zero/issues/detail?id=1447">
+ <p>The transmission bittorrent client uses a client/server
+ architecture, the user interface is the client which communicates
+ to the worker daemon using JSON RPC requests.</p>
+ <p>As with all HTTP RPC schemes like this, any website can send
+ requests to the daemon listening on localhost with XMLHttpRequest(),
+ but the theory is they will be ignored because clients must prove
+ they can read and set a specific header, X-Transmission-Session-Id.
+ Unfortunately, this design doesn't work because of an attack called
+ "DNS rebinding". Any website can simply create a dns name that they
+ are authorized to communicate with, and then make it resolve to
+ localhost.</p>
+ <p>Exploitation is simple, you could set script-torrent-done-enabled
+ and run any command, or set download-dir to /home/user/ and then
+ upload a torrent for .bashrc.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://bugs.chromium.org/p/project-zero/issues/detail?id=1447</url>
+ <url>https://github.com/transmission/transmission/pull/468</url>
+ </references>
+ <dates>
+ <discovery>2017-11-30</discovery>
+ <entry>2018-01-14</entry>
+ </dates>
+ </vuln>
+
<vuln vid="3dbe9492-f7b8-11e7-a12d-6cc21735f730">
<topic>shibboleth-sp -- vulnerable to forged user attribute data</topic>
<affects>
More information about the svn-ports-all
mailing list