Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 908032 (CVE-2023-34237) - <net-nntp/sabnzbd-4.0.2: remote code execution via notification script parameter manipulation
Summary: <net-nntp/sabnzbd-4.0.2: remote code execution via notification script parame...
Status: RESOLVED FIXED
Alias: CVE-2023-34237
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal major
Assignee: Gentoo Security
URL: https://github.com/sabnzbd/sabnzbd/se...
Whiteboard: C1 [glsa+]
Keywords: PullRequest
Depends on: 911137
Blocks:
  Show dependency tree
 
Reported: 2023-06-08 03:44 UTC by John Helmert III
Modified: 2023-12-23 08:23 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2023-06-08 03:44:27 UTC
CVE-2023-34237:

SABnzbd is an open source automated Usenet download tool. A design flaw was discovered in SABnzbd that could allow remote code execution. Manipulating the Parameters setting in the Notification Script functionality allows code execution with the privileges of the SABnzbd process. Exploiting the vulnerabilities requires access to the web interface. Remote exploitation is possible if users[exposed their setup to the internet or other untrusted networks without setting a username/password. By default SABnzbd is only accessible from `localhost`, with no authentication required for the web interface. This issue has been patched in commits `e3a722` and `422b4f` which have been included in the 4.0.2 release. Users are advised to upgrade. Users unable to upgrade should ensure that a username and password have been set if their instance is web accessible.

Patches in 4.0.2, please bump:

https://github.com/sabnzbd/sabnzbd/commit/422b4fce7bfd56e95a315be0400cdfdc585df7cc
https://github.com/sabnzbd/sabnzbd/commit/e3a722664819d1c7c8fab97144cc299b1c18b429
Comment 1 Joe Kappus 2023-06-08 03:49:47 UTC
on it, will link PR shortly after testing completes.
Comment 2 Larry the Git Cow gentoo-dev 2023-06-12 04:13:51 UTC
The bug has been referenced in the following commit(s):

https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=1b6273aaf953637f679988212279fd146f5ce77a

commit 1b6273aaf953637f679988212279fd146f5ce77a
Author:     Joe Kappus <joe@wt.gd>
AuthorDate: 2023-06-08 04:08:57 +0000
Commit:     Sam James <sam@gentoo.org>
CommitDate: 2023-06-12 04:09:46 +0000

    net-nntp/sabnzbd: add 4.0.2
    
    Bug: https://bugs.gentoo.org/908032
    Signed-off-by: Joe Kappus <joe@wt.gd>
    Closes: https://github.com/gentoo/gentoo/pull/31346
    Signed-off-by: Sam James <sam@gentoo.org>

 net-nntp/sabnzbd/Manifest             |   1 +
 net-nntp/sabnzbd/sabnzbd-4.0.2.ebuild | 166 ++++++++++++++++++++++++++++++++++
 2 files changed, 167 insertions(+)
Comment 3 Sam James archtester Gentoo Infrastructure gentoo-dev Security 2023-06-12 04:15:33 UTC
Please file stable bug when ready (whenever you feel it's ready is fine for serious sec bugs, no need to wait 30 days) & set it to block this one, thanks!
Comment 4 Larry the Git Cow gentoo-dev 2023-12-23 08:21:44 UTC
The bug has been referenced in the following commit(s):

https://gitweb.gentoo.org/data/glsa.git/commit/?id=dc0129f73a0d4435c82f3183b00a8db08db2e8e4

commit dc0129f73a0d4435c82f3183b00a8db08db2e8e4
Author:     GLSAMaker <glsamaker@gentoo.org>
AuthorDate: 2023-12-23 08:21:16 +0000
Commit:     Hans de Graaff <graaff@gentoo.org>
CommitDate: 2023-12-23 08:21:40 +0000

    [ GLSA 202312-11 ] SABnzbd: Remote Code Execution
    
    Bug: https://bugs.gentoo.org/908032
    Signed-off-by: GLSAMaker <glsamaker@gentoo.org>
    Signed-off-by: Hans de Graaff <graaff@gentoo.org>

 glsa-202312-11.xml | 42 ++++++++++++++++++++++++++++++++++++++++++
 1 file changed, 42 insertions(+)