Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2019-3463

Опубликовано: 06 фев. 2019
Источник: ubuntu
Приоритет: high
EPSS Средний
CVSS2: 7.5
CVSS3: 9.8

Описание

Insufficient sanitization of arguments passed to rsync can bypass the restrictions imposed by rssh, a restricted shell that should restrict users to perform only rsync operations, resulting in the execution of arbitrary shell commands.

РелизСтатусПримечание
bionic

released

2.3.4-7ubuntu0.1
cosmic

released

2.3.4-8ubuntu0.2
devel

DNE

esm-apps/bionic

released

2.3.4-7ubuntu0.1
esm-apps/xenial

released

2.3.4-4+deb8u2ubuntu0.16.04.2
esm-infra-legacy/trusty

released

2.3.4-4+deb8u2ubuntu0.14.04.2
precise/esm

DNE

trusty

released

2.3.4-4+deb8u2ubuntu0.14.04.2
trusty/esm

released

2.3.4-4+deb8u2ubuntu0.14.04.2
upstream

released

2.3.4-10

Показывать по

EPSS

Процентиль: 94%
0.12799
Средний

7.5 High

CVSS2

9.8 Critical

CVSS3

Связанные уязвимости

CVSS3: 9.8
nvd
около 7 лет назад

Insufficient sanitization of arguments passed to rsync can bypass the restrictions imposed by rssh, a restricted shell that should restrict users to perform only rsync operations, resulting in the execution of arbitrary shell commands.

CVSS3: 9.8
debian
около 7 лет назад

Insufficient sanitization of arguments passed to rsync can bypass the ...

CVSS3: 9.8
github
больше 3 лет назад

Insufficient sanitization of arguments passed to rsync can bypass the restrictions imposed by rssh, a restricted shell that should restrict users to perform only rsync operations, resulting in the execution of arbitrary shell commands.

CVSS3: 9.8
fstec
около 7 лет назад

Уязвимость реализации команды «rsync» командной оболочки rssh, позволяющая нарушителю выполнять произвольные команды оболочки rssh

EPSS

Процентиль: 94%
0.12799
Средний

7.5 High

CVSS2

9.8 Critical

CVSS3