Bug 2251627 (CVE-2023-30801)

Summary: CVE-2023-30801 qbittorrent: default credentials allowed by default
Product: [Other] Security Response Reporter: Avinash Hanwate <ahanwate>
Component: vulnerabilityAssignee: Product Security <prodsec-ir-bot>
Status: NEW --- QA Contact:
Severity: high Docs Contact:
Priority: high    
Version: unspecifiedKeywords: Security
Target Milestone: ---   
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: ---
Doc Text:
A flaw was found in the qBittorrent. qBittorrent contains default hardcoded credentials. A remote attacker could exploit this vulnerability to gain access to the system.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2251629, 2251628    
Bug Blocks:    

Description Avinash Hanwate 2023-11-27 02:22:47 UTC
All versions of the qBittorrent client through 4.5.5 use default credentials when the web user interface is enabled. The administrator is not forced to change the default credentials. As of 4.5.5, this issue has not been fixed. A remote attacker can use the default credentials to authenticate and execute arbitrary operating system commands using the "external program" feature in the web user interface. This was reportedly exploited in the wild in March 2023.

Looks like we have a backport to the 4.6 branch, but not sure if in
any release? https://github.com/qbittorrent/qBittorrent/pull/19751

Comment 1 Avinash Hanwate 2023-11-27 02:23:10 UTC
Created qbittorrent tracking bugs for this issue:

Affects: epel-all [bug 2251629]
Affects: fedora-all [bug 2251628]