4 results (0.001 seconds)

CVSS: 8.8EPSS: 0%CPEs: 5EXPL: 0

14 Dec 2007 — scponly 4.6 and earlier allows remote authenticated users to bypass intended restrictions and execute code by invoking dangerous subcommands including (1) unison, (2) rsync, (3) svn, and (4) svnserve, as originally demonstrated by creating a Subversion (SVN) repository with malicious hooks, then using svn to trigger execution of those hooks. scponly versiones 4.6 y anteriores, permite a los usuarios autenticados remotos omitir las restricciones previstas y ejecutar código invocando subcomandos peligrosos in... • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=437148 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.8EPSS: 0%CPEs: 8EXPL: 0

28 Dec 2005 — Argument injection vulnerability in scponlyc in scponly 4.1 and earlier, when both scp and rsync compatibility are enabled, allows local users to execute arbitrary applications via "getopt" style argument specifications, which are not filtered. • http://secunia.com/advisories/18223 •

CVSS: 8.8EPSS: 0%CPEs: 10EXPL: 1

10 Dec 2004 — The unison command in scponly before 4.0 does not properly restrict programs that can be run, which could allow remote authenticated users to bypass intended access restrictions and execute arbitrary programs via the (1) -rshcmd or (2) -sshcmd flags. • http://marc.info/?l=bugtraq&m=110202047507273&w=2 •

CVSS: 7.5EPSS: 7%CPEs: 2EXPL: 3

22 Apr 2003 — scponly does not properly verify the path when finding the (1) scp or (2) sftp-server programs, which could allow remote authenticated users to bypass access controls by uploading malicious programs and modifying the PATH variable in $HOME/.ssh/environment to locate those programs. scponly no verifica adecuadamente la ruta de los programas scp o sftp-server, lo que podría permitir a usuarios remotos autenticados eludir los controles de acceso cargando programas maliciosos y modificando la variable PATH en e... • https://www.exploit-db.com/exploits/21732 •