CVE-2020-13124

8.8 HIGH

📋 TL;DR

This CVE describes a command injection vulnerability in SABnzbd's web configuration interface that allows authenticated users to execute arbitrary Python commands on the underlying operating system. The vulnerability affects SABnzbd versions 2.3.9 and 3.0.0Alpha2, potentially leading to remote code execution. Attackers with valid credentials can exploit this to gain control of affected systems.

💻 Affected Systems

Products:
  • SABnzbd
Versions: 2.3.9 and 3.0.0Alpha2
Operating Systems: All platforms running SABnzbd
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to the web interface. Default installations with web interface enabled are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining root/administrator privileges, installing persistent backdoors, exfiltrating sensitive data, and pivoting to other systems in the network.

🟠

Likely Case

Authenticated attacker executes arbitrary commands to steal credentials, install cryptocurrency miners, or create backdoors for persistent access.

🟢

If Mitigated

Limited impact due to network segmentation, strong authentication controls, and minimal user privileges on affected systems.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires valid credentials but is straightforward once authenticated. Public proof-of-concept code exists in security advisories.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 2.3.9 and 3.0.0Alpha2

Vendor Advisory: https://github.com/sabnzbd/sabnzbd/security/advisories/GHSA-9x87-96gg-33w2

Restart Required: Yes

Instructions:

1. Download latest version from https://sabnzbd.org/downloads
2. Stop SABnzbd service
3. Install updated version
4. Restart SABnzbd service

🔧 Temporary Workarounds

Disable Web Interface

all

Temporarily disable the web configuration interface to prevent exploitation

Edit sabnzbd.ini and set 'enable_https = 0' and 'enable_http = 0'
Restart SABnzbd service

Network Restriction

all

Restrict web interface access to trusted IP addresses only

Configure firewall to allow only specific IPs to access SABnzbd port (default 8080)

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate SABnzbd instances
  • Enforce strong authentication policies and regularly rotate credentials

🔍 How to Verify

Check if Vulnerable:

Check SABnzbd version via web interface or configuration file. Vulnerable if version is exactly 2.3.9 or 3.0.0Alpha2.

Check Version:

Check web interface status page or sabnzbd.ini configuration file for version information

Verify Fix Applied:

Verify version is updated to a version after 2.3.9 or 3.0.0Alpha2. Check vendor advisory for specific fixed versions.

📡 Detection & Monitoring

Log Indicators:

  • Unusual Python command execution in system logs
  • Unexpected process creation from SABnzbd user
  • Authentication attempts followed by command execution patterns

Network Indicators:

  • Unusual outbound connections from SABnzbd host
  • Command and control traffic patterns

SIEM Query:

source="sabnzbd.log" AND ("python -c" OR "os.system" OR "subprocess")

🔗 References

📤 Share & Export