[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250053

 
 

909

 
 

195940

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS-2019-1328 --- rssh

ID: oval:org.secpod.oval:def:1601083Date: (C)2019-12-23   (M)2023-11-10
Class: PATCHFamily: unix




Insufficient sanitation of environment variables passed to rsync can bypass the restrictions imposed by rssh, a restricted shell that should restrict users to perform only rsync operations, resulting in the execution of arbitrary shell commands. Insufficient sanitation of arguments passed to rsync can bypass the restrictions imposed by rssh, a restricted shell that should restrict users to perform only rsync operations, resulting in the execution of arbitrary shell commands. rssh version 2.3.4 contains a CWE-77: Improper Neutralization of Special Elements used in a Command vulnerability in "allowscp" permission that can result in Local command execution. This attack appear to be exploitable via An authorized SSH user with the "allowscp" permission

Platform:
Amazon Linux AMI
Product:
rssh
Reference:
ALAS-2019-1328
CVE-2019-3464
CVE-2019-3463
CVE-2019-1000018
CVE    3
CVE-2019-1000018
CVE-2019-3464
CVE-2019-3463

© SecPod Technologies