CVE-2007-6350
https://notcve.org/view.php?id=CVE-2007-6350
scponly 4.6 and earlier allows remote authenticated users to bypass intended restrictions and execute code by invoking dangerous subcommands including (1) unison, (2) rsync, (3) svn, and (4) svnserve, as originally demonstrated by creating a Subversion (SVN) repository with malicious hooks, then using svn to trigger execution of those hooks. scponly versiones 4.6 y anteriores, permite a los usuarios autenticados remotos omitir las restricciones previstas y ejecutar código invocando subcomandos peligrosos incluyendo (1) unison, (2) rsync, (3) svn, y (4) svnserve, como es demostrado originalmente mediante la creación de un repositorio Subversion (SVN) con ganchos (hooks) maliciosos, luego usando svn para desencadenar la ejecución de esos ganchos (hooks). • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=437148 http://bugs.gentoo.org/show_bug.cgi?id=201726 http://osvdb.org/44137 http://scponly.cvs.sourceforge.net/scponly/scponly/SECURITY?view=markup http://secunia.com/advisories/28123 http://secunia.com/advisories/28538 http://secunia.com/advisories/28944 http://secunia.com/advisories/28981 http://security.gentoo.org/glsa/glsa-200802-06.xml http://www.debian.org/security/2008/dsa-1473 http://www.securityfocus.com/bid • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2005-4533
https://notcve.org/view.php?id=CVE-2005-4533
Argument injection vulnerability in scponlyc in scponly 4.1 and earlier, when both scp and rsync compatibility are enabled, allows local users to execute arbitrary applications via "getopt" style argument specifications, which are not filtered. • http://secunia.com/advisories/18223 http://secunia.com/advisories/18236 http://sublimation.org/scponly/#relnotes http://www.gentoo.org/security/en/glsa/glsa-200512-17.xml http://www.securityfocus.com/bid/16051 https://exchange.xforce.ibmcloud.com/vulnerabilities/23875 •
CVE-2005-4532
https://notcve.org/view.php?id=CVE-2005-4532
scponlyc in scponly 4.1 and earlier, when the operating system supports LD_PRELOAD mechanisms, allows local users to execute arbitrary code with root privileges by creating a chroot directory in their home directory, hard linking to a system setuid application, and using a modified LD_PRELOAD to modify expected function calls in the setuid application. • http://secunia.com/advisories/18223 http://secunia.com/advisories/18236 http://secunia.com/advisories/18829 http://sublimation.org/scponly/#relnotes http://www.debian.org/security/2006/dsa-969 http://www.gentoo.org/security/en/glsa/glsa-200512-17.xml http://www.securityfocus.com/bid/16051 https://exchange.xforce.ibmcloud.com/vulnerabilities/23874 •
CVE-2004-1162
https://notcve.org/view.php?id=CVE-2004-1162
The unison command in scponly before 4.0 does not properly restrict programs that can be run, which could allow remote authenticated users to bypass intended access restrictions and execute arbitrary programs via the (1) -rshcmd or (2) -sshcmd flags. • http://marc.info/?l=bugtraq&m=110202047507273&w=2 http://marc.info/?l=bugtraq&m=110581113814623&w=2 http://www.gentoo.org/security/en/glsa/glsa-200412-01.xml http://www.securityfocus.com/bid/11791 http://www.sublimation.org/scponly/#relnotes https://exchange.xforce.ibmcloud.com/vulnerabilities/18362 •
CVE-2002-1469 – SCPOnly 2.3/2.4 - SSH Environment Shell Escaping
https://notcve.org/view.php?id=CVE-2002-1469
scponly does not properly verify the path when finding the (1) scp or (2) sftp-server programs, which could allow remote authenticated users to bypass access controls by uploading malicious programs and modifying the PATH variable in $HOME/.ssh/environment to locate those programs. scponly no verifica adecuadamente la ruta de los programas scp o sftp-server, lo que podría permitir a usuarios remotos autenticados eludir los controles de acceso cargando programas maliciosos y modificando la variable PATH en el entorno $HOME/.ssh/ para localizar esos programas. • https://www.exploit-db.com/exploits/21732 http://online.securityfocus.com/archive/1/288245 http://www.iss.net/security_center/static/9913.php http://www.securityfocus.com/bid/5526 http://www.sublimation.org/scponly •