Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-3464

Опубликовано: 06 фев. 2019
Источник: debian

Описание

Insufficient sanitization of environment variables passed to rsync can bypass the restrictions imposed by rssh, a restricted shell that should restrict users to perform only rsync operations, resulting in the execution of arbitrary shell commands.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
rsshfixed2.3.4-10package

Связанные уязвимости

CVSS3: 9.8
ubuntu
около 7 лет назад

Insufficient sanitization of environment variables passed to rsync can bypass the restrictions imposed by rssh, a restricted shell that should restrict users to perform only rsync operations, resulting in the execution of arbitrary shell commands.

CVSS3: 9.8
nvd
около 7 лет назад

Insufficient sanitization of environment variables passed to rsync can bypass the restrictions imposed by rssh, a restricted shell that should restrict users to perform only rsync operations, resulting in the execution of arbitrary shell commands.

CVSS3: 9.8
github
больше 3 лет назад

Insufficient sanitization of environment variables passed to rsync can bypass the restrictions imposed by rssh, a restricted shell that should restrict users to perform only rsync operations, resulting in the execution of arbitrary shell commands.

CVSS3: 9.8
fstec
около 7 лет назад

Уязвимость обработчика команды rsync командной оболочки rssh, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю выполнить произвольную команду