Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-p759-vw7c-cvg8

Опубликовано: 14 мая 2022
Источник: github
Github: Не прошло ревью
CVSS3: 6.4

Описание

Multiple CRLF injection vulnerabilities in session.c in sshd in OpenSSH before 7.2p2 allow remote authenticated users to bypass intended shell-command restrictions via crafted X11 forwarding data, related to the (1) do_authenticated1 and (2) session_x11_req functions.

Multiple CRLF injection vulnerabilities in session.c in sshd in OpenSSH before 7.2p2 allow remote authenticated users to bypass intended shell-command restrictions via crafted X11 forwarding data, related to the (1) do_authenticated1 and (2) session_x11_req functions.

Ссылки

EPSS

Процентиль: 98%
0.56752
Средний

6.4 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.4
ubuntu
больше 9 лет назад

Multiple CRLF injection vulnerabilities in session.c in sshd in OpenSSH before 7.2p2 allow remote authenticated users to bypass intended shell-command restrictions via crafted X11 forwarding data, related to the (1) do_authenticated1 and (2) session_x11_req functions.

redhat
больше 9 лет назад

Multiple CRLF injection vulnerabilities in session.c in sshd in OpenSSH before 7.2p2 allow remote authenticated users to bypass intended shell-command restrictions via crafted X11 forwarding data, related to the (1) do_authenticated1 and (2) session_x11_req functions.

CVSS3: 6.4
nvd
больше 9 лет назад

Multiple CRLF injection vulnerabilities in session.c in sshd in OpenSSH before 7.2p2 allow remote authenticated users to bypass intended shell-command restrictions via crafted X11 forwarding data, related to the (1) do_authenticated1 and (2) session_x11_req functions.

CVSS3: 6.4
debian
больше 9 лет назад

Multiple CRLF injection vulnerabilities in session.c in sshd in OpenSS ...

fstec
больше 9 лет назад

Уязвимости средства криптографической защиты OpenSSH, позволяющие нарушителю обойти ограничения интерпретатора команд

EPSS

Процентиль: 98%
0.56752
Средний

6.4 Medium

CVSS3