Pizzashack

Rssh

7 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 13.44%
  • Veröffentlicht 06.02.2019 19:29:00
  • Zuletzt bearbeitet 21.11.2024 04:42:05

Insufficient sanitization of arguments passed to rsync can bypass the restrictions imposed by rssh, a restricted shell that should restrict users to perform only rsync operations, resulting in the execution of arbitrary shell commands.

  • EPSS 10.79%
  • Veröffentlicht 06.02.2019 19:29:00
  • Zuletzt bearbeitet 21.11.2024 04:42:05

Insufficient sanitization of environment variables passed to rsync can bypass the restrictions imposed by rssh, a restricted shell that should restrict users to perform only rsync operations, resulting in the execution of arbitrary shell commands.

Exploit
  • EPSS 0.29%
  • Veröffentlicht 04.02.2019 21:29:01
  • Zuletzt bearbeitet 19.03.2025 20:15:15

rssh version 2.3.4 contains a CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in allowscp permission that can result in Local command execution. This attack appear to be exploitable via An aut...

  • EPSS 0.05%
  • Veröffentlicht 11.01.2013 01:55:00
  • Zuletzt bearbeitet 11.04.2025 00:51:21

rssh 2.3.2, as used by Debian, Fedora, and others, when the rsync protocol is enabled, allows local users to bypass intended restricted shell access via a (1) "-e" or (2) "--" command line option.

  • EPSS 0.06%
  • Veröffentlicht 11.01.2013 01:55:00
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Incomplete blacklist vulnerability in rssh before 2.3.4, when the rsync protocol is enabled, allows local users to bypass intended restricted shell access via the --rsh command line option.

  • EPSS 0.06%
  • Veröffentlicht 31.08.2012 18:55:05
  • Zuletzt bearbeitet 11.04.2025 00:51:21

rssh 2.3.3 and earlier allows local users to bypass intended restricted shell access via crafted environment variables in the command line.

  • EPSS 2.56%
  • Veröffentlicht 23.10.2004 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Format string vulnerability in log.c in rssh before 2.2.2 allows remote authenticated users to execute arbitrary code.