Published: 07/05/2021 Updated: 19/05/2021
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 5.3 | Impact Score: 1.4 | Exploitability Score: 3.9
Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Summary

SABnzbd is an open source binary newsreader. A vulnerability exists in SABnzbd that could trick the `filesystem.renamer()` function into writing downloaded files outside the configured Download Folder via malicious PAR2 files. A patch was released as part of SABnzbd 3.2.1RC1. As a workaround, limit downloads to NZBs without PAR2 files, deny write permissions to the SABnzbd process outside areas it must access to perform its job, or update to a fixed version.

Most Upvoted Vulmon Research Post

There is no Researcher post for this vulnerability
Would you like to share something about it? Sign up now to share your knowledge with the community.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

sabnzbd sabnzbd

Github Repositories

CVE-2021-29488 Proof-of-Concept (PoC) script to exploit CVE-2021-29488 Usage Achieves exploitation of CVE-2021-29488 chmod +x CVE-2021-29488sh sudo /CVE-2021-29488sh -c <TargetIP> sudo /CVE-2021-29488sh -l <ListoFIPs>