-
-
Notifications
You must be signed in to change notification settings - Fork 4.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Possible RCE being exploited #18731
Comments
I have to ask: Why the hell did you expose your client to the interwebz with default credentials? |
@sledgehammer999 Lazy and dumb. |
It's no RCE. You exposed the webui with default password to the internet. All things the attacker is doing are intended features. I've seen this attack on some other users too. So it's exploited in the wild. Maybe we could do something with more secure |
Apparently there are users exposing the webui client to the internet without changing the default credentials. And apparently there are attackers out there scanning for exposed clients and then logging in with the default credentials and running code (crypto miners). Closes qbittorrent#13833 Closes qbittorrent#16529 Closes qbittorrent#18731
It seems the option "Use UPnP / NAT-PMP to forward the port from my router" in "WebUI" settings is enabled by default. That means by default you expose your client to the interweb, even if you are behind a NAT. |
It seems pretty crazy that UPnP is enabled by default on the WebUI when it has the power to run random binaries from the internet with the default username/password. |
Folks what's the status of this? When will this be released? Is there a CVE for this? Quite frankly I'm very surprised at how this was handled so far. We have indication of this begin exploited, the fix has not been released yet nor has a CVE been assigned. Upstream repos still contain this very dangerous settings, that will lead to exploitation. I would have expected the qBittorrent team to be far more proactive in dealing with this type of bugs. |
I just dropped from utorrent with it's suspicious activity, went to qbit and now some guys lurking around in powershell through torrent app on my pc. How the hell is it even possible? ) |
It's possible because of insecure default config of qBittorrent and don't knowing your used software. |
I tried it with a few friends on different versions (windows and linux) but it doesn't seem to be enabled by default. Are you sure it wasn't something you enabled in the past to try and forgot to turn it off ? |
It was fixed and disabled by default. The PR (linked above) and a backport was merged months ago. |
The fact that's merged and backported doesn't necessarily mean distro have backported the fix |
Hell, many distros are hopelessly behind in terms of updating applications. But we are not responsible for this. |
Addressed with #19777 |
Well, distributions generally don't know that there's anything to backport unless someone's directly reported a bug to them or there's a CVE. I'm coming here from CVE-2023-30801. |
The thing is that none of this is an "exploit" by any rigorous and serious definition. This is everything working as documented and designed. "but this can lead to bad stuff happening!" is not an "exploit" nor does it need a CVE. Please stop, you're embarrassing yourself. |
|
First, let me address what seems like a unwarranted for personal attack.
I don't think it's conclusive for a good security conversation to call out in this way people that hold an opinion different than yours. Talking about problems in their perceived threat model seems like the best way to improve the security ecosystem, the opposite disincentivize open conversation and thus is a barrier to truly secure systems. I feel there is a disconnect on what we are talking about. The problem here is "unsafe defaults will lead to exploitation", not that a feature is working or not working as intended. I'd like to know what your I hope you have great day, |
As one of the victims, I came back from 2024 and point out the original design was flawed indeed. The default password itself might not be a big deal in home intranet, but the issues chained up. The qBittorrent-nox < 4.5.3 set WebUI and WebUI UPNP to enable by default, which caused many hosts got hacked, it is an issue and shall take the blame. There are users who used SSH or VPN like me access the sever subnet without punch a hole on firware still got hacked. After the incident, many user came to the discussion and seeked for help, however, before the offical fix (2b4fcda) users have only guessing they had mistakenly enable UPNP and the situation was really confusing. e.g. #7715 (comment) I truely glad @mayli @glassez @CarloMara and reset of the forks pushed this topic forward, the security risk and update must be advertised. |
happened to me too in 2024, qbittorrent keeps compromising the security of people's machines. it's ridiculous to still have a default password while listen on public network interfaces. the default interface should be 127.0.0.1 and nothing else, people can ssh tunnel into it or set up a reverse proxy if they want secure outside access. the default password should be autogenerated on first run. the problem still exists in qbittorrent-nox v4.4.1 that ships with ubuntu. |
qBittorrent no longer has a default password since version 4.6.1, instead, an automatically generated password is created at startup until you set your own.
Perhaps Ubuntu will reach qBittorrent v4.6.1+ in two+ years. Or you can use a more recent source, such as the official AppImage. |
On Mantic (which is EOL soon), it should be 4.5.4-1: kevin@kevinbuntu:~$ apt list -a qbittorrent
Listing... Done
qbittorrent/mantic 4.5.4-1 amd64
kevin@kevinbuntu:~$ apt list -a qbittorrent-nox
Listing... Done
qbittorrent-nox/mantic 4.5.4-1 amd64 which has UPnP turned off by default: https://git.launchpad.net/ubuntu/+source/qbittorrent/tree/src/base/preferences.cpp?h=ubuntu/mantic#n600 For older LTS versions that are not patched, I contacted the Ubuntu package maintainer and suggested backporting the fix: https://bugs.launchpad.net/ubuntu/+source/qbittorrent/+bug/2071493 |
Suggestion
Qbittorrent isn't quite secure since it has a default password and hardcoded webui port. Qb also allows executing random code directly through the webui.
I've recently noticed the following entries in the log
It's clearly that there are some script boys are scanning peers and exploiting this RCE on the interweb, and it's better to have some security defaults to prevent this.
Couple possible ideas including force non-default password on login and deny external program execution if default password being used.
Use case
No response
Extra info/examples/attachments
No response
The text was updated successfully, but these errors were encountered: