Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2002-1715

Опубликовано: 31 дек. 2002
Источник: nvd
CVSS2: 7.2
EPSS Низкий

Описание

SSH 1 through 3, and possibly other versions, allows local users to bypass restricted shells such as rbash or rksh by uploading a script to a world-writeable directory, then executing that script to gain normal shell access.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:ssh:ssh:1.2.0:*:*:*:*:*:*:*
cpe:2.3:a:ssh:ssh:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:ssh:ssh:1.2.2:*:*:*:*:*:*:*
cpe:2.3:a:ssh:ssh:1.2.3:*:*:*:*:*:*:*
cpe:2.3:a:ssh:ssh:1.2.4:*:*:*:*:*:*:*
cpe:2.3:a:ssh:ssh:1.2.5:*:*:*:*:*:*:*
cpe:2.3:a:ssh:ssh:1.2.6:*:*:*:*:*:*:*
cpe:2.3:a:ssh:ssh:1.2.7:*:*:*:*:*:*:*
cpe:2.3:a:ssh:ssh:1.2.8:*:*:*:*:*:*:*
cpe:2.3:a:ssh:ssh:1.2.9:*:*:*:*:*:*:*
cpe:2.3:a:ssh:ssh:1.2.10:*:*:*:*:*:*:*
cpe:2.3:a:ssh:ssh:1.2.11:*:*:*:*:*:*:*
cpe:2.3:a:ssh:ssh:1.2.12:*:*:*:*:*:*:*
cpe:2.3:a:ssh:ssh:1.2.13:*:*:*:*:*:*:*
cpe:2.3:a:ssh:ssh:1.2.14:*:*:*:*:*:*:*
cpe:2.3:a:ssh:ssh:1.2.15:*:*:*:*:*:*:*
cpe:2.3:a:ssh:ssh:1.2.16:*:*:*:*:*:*:*
cpe:2.3:a:ssh:ssh:1.2.17:*:*:*:*:*:*:*
cpe:2.3:a:ssh:ssh:1.2.18:*:*:*:*:*:*:*
cpe:2.3:a:ssh:ssh:1.2.19:*:*:*:*:*:*:*
cpe:2.3:a:ssh:ssh:1.2.20:*:*:*:*:*:*:*
cpe:2.3:a:ssh:ssh:1.2.21:*:*:*:*:*:*:*
cpe:2.3:a:ssh:ssh:1.2.22:*:*:*:*:*:*:*
cpe:2.3:a:ssh:ssh:1.2.23:*:*:*:*:*:*:*
cpe:2.3:a:ssh:ssh:1.2.24:*:*:*:*:*:*:*
cpe:2.3:a:ssh:ssh:1.2.25:*:*:*:*:*:*:*
cpe:2.3:a:ssh:ssh:1.2.26:*:*:*:*:*:*:*
cpe:2.3:a:ssh:ssh:1.2.27:*:*:*:*:*:*:*
cpe:2.3:a:ssh:ssh:1.2.28:*:*:*:*:*:*:*
cpe:2.3:a:ssh:ssh:1.2.29:*:*:*:*:*:*:*
cpe:2.3:a:ssh:ssh:1.2.30:*:*:*:*:*:*:*
cpe:2.3:a:ssh:ssh:1.2.31:*:*:*:*:*:*:*
cpe:2.3:a:ssh:ssh2:2.0:*:*:*:*:*:*:*
cpe:2.3:a:ssh:ssh2:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:ssh:ssh2:2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:ssh:ssh2:2.0.3:*:*:*:*:*:*:*
cpe:2.3:a:ssh:ssh2:2.0.4:*:*:*:*:*:*:*
cpe:2.3:a:ssh:ssh2:2.0.5:*:*:*:*:*:*:*
cpe:2.3:a:ssh:ssh2:2.0.6:*:*:*:*:*:*:*
cpe:2.3:a:ssh:ssh2:2.0.7:*:*:*:*:*:*:*
cpe:2.3:a:ssh:ssh2:2.0.8:*:*:*:*:*:*:*
cpe:2.3:a:ssh:ssh2:2.0.9:*:*:*:*:*:*:*
cpe:2.3:a:ssh:ssh2:2.0.10:*:*:*:*:*:*:*
cpe:2.3:a:ssh:ssh2:2.0.11:*:*:*:*:*:*:*
cpe:2.3:a:ssh:ssh2:2.0.12:*:*:*:*:*:*:*
cpe:2.3:a:ssh:ssh2:2.0.13:*:*:*:*:*:*:*
cpe:2.3:a:ssh:ssh2:2.1:*:*:*:*:*:*:*
cpe:2.3:a:ssh:ssh2:2.2:*:*:*:*:*:*:*
cpe:2.3:a:ssh:ssh2:2.3:*:*:*:*:*:*:*
cpe:2.3:a:ssh:ssh2:2.4:*:*:*:*:*:*:*
cpe:2.3:a:ssh:ssh2:2.5:*:*:*:*:*:*:*
cpe:2.3:a:ssh:ssh2:3.0:*:*:*:*:*:*:*

EPSS

Процентиль: 30%
0.00108
Низкий

7.2 High

CVSS2

Дефекты

NVD-CWE-Other

Связанные уязвимости

debian
почти 23 года назад

SSH 1 through 3, and possibly other versions, allows local users to by ...

github
больше 3 лет назад

SSH 1 through 3, and possibly other versions, allows local users to bypass restricted shells such as rbash or rksh by uploading a script to a world-writeable directory, then executing that script to gain normal shell access.

EPSS

Процентиль: 30%
0.00108
Низкий

7.2 High

CVSS2

Дефекты

NVD-CWE-Other