In qBittorrent before 4.1.7, the function Application::runExternalProgram() located in app/application.cpp allows command injection via shell metacharacters in the torrent name parameter or current tracker parameter, as demonstrated by remote command execution via a crafted name within an RSS feed.
References
Configurations
Information
Published : 2019-07-17 15:15
Updated : 2020-08-24 10:37
NVD link : CVE-2019-13640
Mitre link : CVE-2019-13640
JSON object : View
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Products Affected
qbittorrent
- qbittorrent