4 results (0.004 seconds)

CVSS: 8.5EPSS: 1%CPEs: 5EXPL: 0

scponly 4.6 and earlier allows remote authenticated users to bypass intended restrictions and execute code by invoking dangerous subcommands including (1) unison, (2) rsync, (3) svn, and (4) svnserve, as originally demonstrated by creating a Subversion (SVN) repository with malicious hooks, then using svn to trigger execution of those hooks. scponly versiones 4.6 y anteriores, permite a los usuarios autenticados remotos omitir las restricciones previstas y ejecutar código invocando subcomandos peligrosos incluyendo (1) unison, (2) rsync, (3) svn, y (4) svnserve, como es demostrado originalmente mediante la creación de un repositorio Subversion (SVN) con ganchos (hooks) maliciosos, luego usando svn para desencadenar la ejecución de esos ganchos (hooks). • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=437148 http://bugs.gentoo.org/show_bug.cgi?id=201726 http://osvdb.org/44137 http://scponly.cvs.sourceforge.net/scponly/scponly/SECURITY?view=markup http://secunia.com/advisories/28123 http://secunia.com/advisories/28538 http://secunia.com/advisories/28944 http://secunia.com/advisories/28981 http://security.gentoo.org/glsa/glsa-200802-06.xml http://www.debian.org/security/2008/dsa-1473 http://www.securityfocus.com/bid • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.5EPSS: 0%CPEs: 8EXPL: 0

Argument injection vulnerability in scponlyc in scponly 4.1 and earlier, when both scp and rsync compatibility are enabled, allows local users to execute arbitrary applications via "getopt" style argument specifications, which are not filtered. • http://secunia.com/advisories/18223 http://secunia.com/advisories/18236 http://sublimation.org/scponly/#relnotes http://www.gentoo.org/security/en/glsa/glsa-200512-17.xml http://www.securityfocus.com/bid/16051 https://exchange.xforce.ibmcloud.com/vulnerabilities/23875 •

CVSS: 7.2EPSS: 0%CPEs: 11EXPL: 0

scponlyc in scponly 4.1 and earlier, when the operating system supports LD_PRELOAD mechanisms, allows local users to execute arbitrary code with root privileges by creating a chroot directory in their home directory, hard linking to a system setuid application, and using a modified LD_PRELOAD to modify expected function calls in the setuid application. • http://secunia.com/advisories/18223 http://secunia.com/advisories/18236 http://secunia.com/advisories/18829 http://sublimation.org/scponly/#relnotes http://www.debian.org/security/2006/dsa-969 http://www.gentoo.org/security/en/glsa/glsa-200512-17.xml http://www.securityfocus.com/bid/16051 https://exchange.xforce.ibmcloud.com/vulnerabilities/23874 •

CVSS: 7.5EPSS: 0%CPEs: 10EXPL: 1

The unison command in scponly before 4.0 does not properly restrict programs that can be run, which could allow remote authenticated users to bypass intended access restrictions and execute arbitrary programs via the (1) -rshcmd or (2) -sshcmd flags. • http://marc.info/?l=bugtraq&m=110202047507273&w=2 http://marc.info/?l=bugtraq&m=110581113814623&w=2 http://www.gentoo.org/security/en/glsa/glsa-200412-01.xml http://www.securityfocus.com/bid/11791 http://www.sublimation.org/scponly/#relnotes https://exchange.xforce.ibmcloud.com/vulnerabilities/18362 •