Name | CVE-2020-13124 |
Description | SABnzbd 2.3.9 and 3.0.0Alpha2 has a command injection vulnerability in the web configuration interface that permits an authenticated user to execute arbitrary Python commands on the underlying operating system. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more) |
NVD severity | medium |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
sabnzbdplus (PTS) | stretch/contrib | 1.1.1+dfsg-1 | vulnerable |
| buster/contrib | 2.3.6+dfsg-1 | vulnerable |
| sid/contrib, bullseye/contrib | 3.1.1+dfsg-2 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
sabnzbdplus | source | (unstable) | 3.1.1+dfsg-1 | | | |
Notes
[buster] - sabnzbdplus <no-dsa> (Minor issue, can be fixed via point release, contrib not supported)
[stretch] - sabnzbdplus <ignored> (contrib not supported)
https://github.com/sabnzbd/sabnzbd/security/advisories/GHSA-9x87-96gg-33w2
https://github.com/sabnzbd/sabnzbd/commit/dfcba6e2fb37f58fea06b453b1ba258c7f110429
https://github.com/sabnzbd/sabnzbd/commit/73d3f7b5c248fc369de3454fe53e3e93924ebfe3