[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

252271

 
 

909

 
 

196835

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CCE
view XML

CCE-92321-9

Platform: cpe:/o:amazon:linux:2Date: (C)2018-10-29   (M)2023-07-04



To ensure users are not able to present environment options to the SSH daemon, add or correct the following line in '/etc/ssh/sshd_config': 'PermitUserEnvironment no'


Parameter:

[deny/allow/all]


Technical Mechanism:

SSH environment options potentially allow users to bypass access restriction in some configurations.

CCSS Severity:CCSS Metrics:
CCSS Score : 5.0Attack Vector: NETWORK
Exploit Score: 1.6Attack Complexity: HIGH
Impact Score: 3.4Privileges Required: LOW
Severity: MEDIUMUser Interaction: NONE
Vector: AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:LScope: UNCHANGED
 Confidentiality: LOW
 Integrity: LOW
 Availability: LOW
  

References:
Resource IdReference
SCAP Repo OVAL Definitionoval:org.secpod.oval:def:48815
SCAP Repo OVAL Definitionoval:org.secpod.oval:def:48508


OVAL    2
oval:org.secpod.oval:def:48508
oval:org.secpod.oval:def:48815
XCCDF    2
xccdf_org.secpod_benchmark_general_Amazon_Linux_AMI
xccdf_org.secpod_benchmark_general_Amazon_Linux_2

© SecPod Technologies