ALAS-2019-1328 --- rsshID: oval:org.secpod.oval:def:1601083 | Date: (C)2019-12-23 (M)2023-11-10 |
Class: PATCH | Family: unix |
Insufficient sanitation of environment variables passed to rsync can bypass the restrictions imposed by rssh, a restricted shell that should restrict users to perform only rsync operations, resulting in the execution of arbitrary shell commands. Insufficient sanitation of arguments passed to rsync can bypass the restrictions imposed by rssh, a restricted shell that should restrict users to perform only rsync operations, resulting in the execution of arbitrary shell commands. rssh version 2.3.4 contains a CWE-77: Improper Neutralization of Special Elements used in a Command vulnerability in "allowscp" permission that can result in Local command execution. This attack appear to be exploitable via An authorized SSH user with the "allowscp" permission
Platform: |
Amazon Linux AMI |