Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-28hp-2gv6-gjp8

Опубликовано: 13 мая 2022
Источник: github
Github: Не прошло ревью
CVSS3: 5.3

Описание

In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass intended access restrictions via the filename of . or an empty filename. The impact is modifying the permissions of the target directory on the client side.

In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass intended access restrictions via the filename of . or an empty filename. The impact is modifying the permissions of the target directory on the client side.

EPSS

Процентиль: 87%
0.03377
Низкий

5.3 Medium

CVSS3

Дефекты

CWE-863

Связанные уязвимости

CVSS3: 5.3
ubuntu
почти 7 лет назад

In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass intended access restrictions via the filename of . or an empty filename. The impact is modifying the permissions of the target directory on the client side.

CVSS3: 5.3
redhat
почти 7 лет назад

In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass intended access restrictions via the filename of . or an empty filename. The impact is modifying the permissions of the target directory on the client side.

CVSS3: 5.3
nvd
почти 7 лет назад

In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass intended access restrictions via the filename of . or an empty filename. The impact is modifying the permissions of the target directory on the client side.

CVSS3: 5.3
debian
почти 7 лет назад

In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to b ...

CVSS3: 5.3
fstec
около 7 лет назад

Уязвимость средства криптографической защиты OpenSSH, вызваная ошибками при проверке имени каталога scp.c в клиенте scp, позволяющая нарушителю изменить права доступа к целевому каталогу

EPSS

Процентиль: 87%
0.03377
Низкий

5.3 Medium

CVSS3

Дефекты

CWE-863