Improper Authentication in qBittorrent



| Updated: 2020-08-08
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2017-12778
CWE-ID CWE-287
Exploitation vector Local
Public exploit N/A
Vulnerable software
qBittorrent
Client/Desktop applications / Other client software

Vendor qbittorrent.org

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Improper Authentication

EUVDB-ID: #VU35921

Risk: Low

CVSSv4.0: 5.8 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2017-12778

CWE-ID: CWE-287 - Improper Authentication

Exploit availability: No

Description

The vulnerability allows a local authenticated user to read and manipulate data.

** DISPUTED ** The UI Lock feature in qBittorrent version 3.3.15 is vulnerable to Authentication Bypass, which allows Attack to gain unauthorized access to qBittorrent functions by tampering the affected flag value of the config file at the C:Users<username>RoamingqBittorrent pathname. The attacker must change the value of the "locked" attribute to "false" within the "Locking" stanza. NOTE: This is an intended behavior. See https://github.com/qbittorrent/qBittorrent/wiki/I-forgot-my-UI-lock-password.

Mitigation

Install update from vendor's website.

Vulnerable software versions

qBittorrent: 3.3.15

CPE2.3 External links

https://archive.is/eF2GR
https://github.com/qbittorrent/qBittorrent/wiki/I-forgot-my-UI-lock-password
https://medium.com/@BaYinMin/cve-2017-12778-qbittorrent-ui-lock-authentication-bypass-30959ff55ada


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###