Name | CVE-2020-13124 |
Description | SABnzbd 2.3.9 and 3.0.0Alpha2 has a command injection vulnerability in the web configuration interface that permits an authenticated user to execute arbitrary Python commands on the underlying operating system. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
sabnzbdplus (PTS) | bullseye/contrib | 3.1.1+dfsg-2+deb11u1 | fixed |
| bookworm/contrib | 3.7.1+dfsg-2 | fixed |
| trixie/contrib, sid/contrib | 4.3.3+dfsg-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
sabnzbdplus | source | stretch | (unfixed) | end-of-life | | |
sabnzbdplus | source | buster | 2.3.6+dfsg-1+deb10u1 | | | |
sabnzbdplus | source | (unstable) | 3.1.1+dfsg-1 | | | |
Notes
[stretch] - sabnzbdplus <end-of-life> (contrib not supported)
https://github.com/sabnzbd/sabnzbd/security/advisories/GHSA-9x87-96gg-33w2
https://github.com/sabnzbd/sabnzbd/commit/dfcba6e2fb37f58fea06b453b1ba258c7f110429
https://github.com/sabnzbd/sabnzbd/commit/73d3f7b5c248fc369de3454fe53e3e93924ebfe3