Bug 2251627 (CVE-2023-30801) - CVE-2023-30801 qbittorrent: default credentials allowed by default
Summary: CVE-2023-30801 qbittorrent: default credentials allowed by default
Keywords:
Status: NEW
Alias: CVE-2023-30801
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2251629 2251628
Blocks:
TreeView+ depends on / blocked
 
Reported: 2023-11-27 02:22 UTC by Avinash Hanwate
Modified: 2023-11-27 02:23 UTC (History)
0 users

Fixed In Version:
Doc Type: ---
Doc Text:
A flaw was found in the qBittorrent. qBittorrent contains default hardcoded credentials. A remote attacker could exploit this vulnerability to gain access to the system.
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description Avinash Hanwate 2023-11-27 02:22:47 UTC
All versions of the qBittorrent client through 4.5.5 use default credentials when the web user interface is enabled. The administrator is not forced to change the default credentials. As of 4.5.5, this issue has not been fixed. A remote attacker can use the default credentials to authenticate and execute arbitrary operating system commands using the "external program" feature in the web user interface. This was reportedly exploited in the wild in March 2023.

Looks like we have a backport to the 4.6 branch, but not sure if in
any release? https://github.com/qbittorrent/qBittorrent/pull/19751

Comment 1 Avinash Hanwate 2023-11-27 02:23:10 UTC
Created qbittorrent tracking bugs for this issue:

Affects: epel-all [bug 2251629]
Affects: fedora-all [bug 2251628]


Note You need to log in before you can comment on or make changes to this bug.