Описание
default-rsyncssh.lua in Lsyncd 2.1.5 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in a filename.
Ссылки
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Mailing ListThird Party Advisory
- ExploitMailing ListThird Party Advisory
- Third Party AdvisoryVDB Entry
- ExploitIssue TrackingPatch
- ExploitIssue TrackingPatch
- Issue TrackingPatch
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Mailing ListThird Party Advisory
- ExploitMailing ListThird Party Advisory
- Third Party AdvisoryVDB Entry
- ExploitIssue TrackingPatch
- ExploitIssue TrackingPatch
Уязвимые конфигурации
Конфигурация 1
cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
Конфигурация 2
Одно из
cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*
Конфигурация 3Версия до 2.1.5 (включая)
cpe:2.3:a:lsyncd_project:lsyncd:*:*:*:*:*:*:*:*
EPSS
Процентиль: 89%
0.04309
Низкий
7.5 High
CVSS2
Дефекты
CWE-77
Связанные уязвимости
ubuntu
около 11 лет назад
default-rsyncssh.lua in Lsyncd 2.1.5 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in a filename.
debian
около 11 лет назад
default-rsyncssh.lua in Lsyncd 2.1.5 and earlier allows remote attacke ...
github
больше 3 лет назад
default-rsyncssh.lua in Lsyncd 2.1.5 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in a filename.
EPSS
Процентиль: 89%
0.04309
Низкий
7.5 High
CVSS2
Дефекты
CWE-77