Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-p759-vw7c-cvg8

Опубликовано: 14 мая 2022
Источник: github
Github: Не прошло ревью
CVSS3: 6.4

Описание

Multiple CRLF injection vulnerabilities in session.c in sshd in OpenSSH before 7.2p2 allow remote authenticated users to bypass intended shell-command restrictions via crafted X11 forwarding data, related to the (1) do_authenticated1 and (2) session_x11_req functions.

Multiple CRLF injection vulnerabilities in session.c in sshd in OpenSSH before 7.2p2 allow remote authenticated users to bypass intended shell-command restrictions via crafted X11 forwarding data, related to the (1) do_authenticated1 and (2) session_x11_req functions.

Ссылки

EPSS

Процентиль: 97%
0.43987
Средний

6.4 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.4
ubuntu
почти 10 лет назад

Multiple CRLF injection vulnerabilities in session.c in sshd in OpenSSH before 7.2p2 allow remote authenticated users to bypass intended shell-command restrictions via crafted X11 forwarding data, related to the (1) do_authenticated1 and (2) session_x11_req functions.

redhat
почти 10 лет назад

Multiple CRLF injection vulnerabilities in session.c in sshd in OpenSSH before 7.2p2 allow remote authenticated users to bypass intended shell-command restrictions via crafted X11 forwarding data, related to the (1) do_authenticated1 and (2) session_x11_req functions.

CVSS3: 6.4
nvd
почти 10 лет назад

Multiple CRLF injection vulnerabilities in session.c in sshd in OpenSSH before 7.2p2 allow remote authenticated users to bypass intended shell-command restrictions via crafted X11 forwarding data, related to the (1) do_authenticated1 and (2) session_x11_req functions.

CVSS3: 6.4
debian
почти 10 лет назад

Multiple CRLF injection vulnerabilities in session.c in sshd in OpenSS ...

fstec
почти 10 лет назад

Уязвимости средства криптографической защиты OpenSSH, позволяющие нарушителю обойти ограничения интерпретатора команд

EPSS

Процентиль: 97%
0.43987
Средний

6.4 Medium

CVSS3