Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Exploit Related] Add some sort of UI visibility for Autorun configuration #20385

Closed
morgenman opened this issue Feb 8, 2024 · 2 comments
Closed
Labels
Duplicate Security Related to software vulnerability in qbt (don't overuse this) WebUI WebUI-related issues/changes

Comments

@morgenman
Copy link

qBittorrent & operating system versions

4.5.2-4.6.3+
Windows 11

What is the problem?

Today I discovered a crypto miner on my machine. After some digging I discovered that it was started by qBittorrent.
My version of qBittorrent was 4.5.2.
About a year ago I was on version 4.5.1, which had a known exploit due to a flaw in the web UI (which is my current theory on how this exploit was loaded on my machine in the first place). I updated to 4.5.2 almost immediately after it was released having read about the exploit.
I decided to update and see if the same miner was loaded on my machine again.
It did, with the same issue for the current version (4.6.3).
The reason this issue persisted post updating was because at some point in the past, a powershell command had been added to my autorun block of my qBittorrent.ini file. (see block below)
I highly recommend either displaying autorun settings somewhere in the UI or sanitizing said chunk of settings on update.
The address in which it was delivering funds has 250+ compromised devices in the pool, many of which labeled something along the lines of "qbittorrent server" or "plex server".

Steps to reproduce

No response

Additional context

image

Log(s) & preferences file(s)

No response

@HanabishiRecca
Copy link
Contributor

HanabishiRecca commented Feb 10, 2024

I highly recommend either displaying autorun settings somewhere in the UI

They do exist in the UI, Downloads > Run external program.

image

or sanitizing said chunk of settings

That settings are designed to run arbitrary programs and scripts. There is no real way to distinguish between user's inteded and malicious scripts.

@thalieht
Copy link
Contributor

Duplicate of #13833

https://www.qbittorrent.org/news#sun-oct-22th-2023---qbittorrent-v4.6.0-release

SECURITY NOTICE: WebUI users YOU MUST change the default Webui credentials (aka "adminadmin") when exposing the WebUI to the Internet. There are reports(1, 2, 3, 4) that this is possibly exploited in the wild. This will be remedied in a followup release where the default credentials will be disabled and a credentials change will be forced.

@thalieht thalieht closed this as not planned Won't fix, can't repro, duplicate, stale Feb 10, 2024
@thalieht thalieht added Security Related to software vulnerability in qbt (don't overuse this) Duplicate WebUI WebUI-related issues/changes labels Feb 10, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Duplicate Security Related to software vulnerability in qbt (don't overuse this) WebUI WebUI-related issues/changes
Projects
None yet
Development

No branches or pull requests

3 participants