Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-48jx-mwjr-89wq

Опубликовано: 03 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Sendmail Consortium's Restricted Shell (SMRSH) in Sendmail 8.12.6, 8.11.6-15, and possibly other versions after 8.11 from 5/19/1998, allows attackers to bypass the intended restrictions of smrsh by inserting additional commands after (1) "||" sequences or (2) "/" characters, which are not properly filtered or verified.

Sendmail Consortium's Restricted Shell (SMRSH) in Sendmail 8.12.6, 8.11.6-15, and possibly other versions after 8.11 from 5/19/1998, allows attackers to bypass the intended restrictions of smrsh by inserting additional commands after (1) "||" sequences or (2) "/" characters, which are not properly filtered or verified.

EPSS

Процентиль: 85%
0.02514
Низкий

Связанные уязвимости

ubuntu
больше 22 лет назад

Описание отсутствует

redhat
больше 22 лет назад

Sendmail Consortium's Restricted Shell (SMRSH) in Sendmail 8.12.6, 8.11.6-15, and possibly other versions after 8.11 from 5/19/1998, allows attackers to bypass the intended restrictions of smrsh by inserting additional commands after (1) "||" sequences or (2) "/" characters, which are not properly filtered or verified.

nvd
больше 22 лет назад

Sendmail Consortium's Restricted Shell (SMRSH) in Sendmail 8.12.6, 8.11.6-15, and possibly other versions after 8.11 from 5/19/1998, allows attackers to bypass the intended restrictions of smrsh by inserting additional commands after (1) "||" sequences or (2) "/" characters, which are not properly filtered or verified.

debian
больше 22 лет назад

Sendmail Consortium's Restricted Shell (SMRSH) in Sendmail 8.12.6, 8.1 ...

EPSS

Процентиль: 85%
0.02514
Низкий