CVE-2019-3463
- EPSS 13.44%
- Veröffentlicht 06.02.2019 19:29:00
- Zuletzt bearbeitet 21.11.2024 04:42:05
Insufficient sanitization of arguments passed to rsync can bypass the restrictions imposed by rssh, a restricted shell that should restrict users to perform only rsync operations, resulting in the execution of arbitrary shell commands.
CVE-2019-3464
- EPSS 10.79%
- Veröffentlicht 06.02.2019 19:29:00
- Zuletzt bearbeitet 21.11.2024 04:42:05
Insufficient sanitization of environment variables passed to rsync can bypass the restrictions imposed by rssh, a restricted shell that should restrict users to perform only rsync operations, resulting in the execution of arbitrary shell commands.
CVE-2019-1000018
- EPSS 0.29%
- Veröffentlicht 04.02.2019 21:29:01
- Zuletzt bearbeitet 19.03.2025 20:15:15
rssh version 2.3.4 contains a CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in allowscp permission that can result in Local command execution. This attack appear to be exploitable via An aut...
CVE-2012-2251
- EPSS 0.05%
- Veröffentlicht 11.01.2013 01:55:00
- Zuletzt bearbeitet 11.04.2025 00:51:21
rssh 2.3.2, as used by Debian, Fedora, and others, when the rsync protocol is enabled, allows local users to bypass intended restricted shell access via a (1) "-e" or (2) "--" command line option.
CVE-2012-2252
- EPSS 0.06%
- Veröffentlicht 11.01.2013 01:55:00
- Zuletzt bearbeitet 11.04.2025 00:51:21
Incomplete blacklist vulnerability in rssh before 2.3.4, when the rsync protocol is enabled, allows local users to bypass intended restricted shell access via the --rsh command line option.
CVE-2012-3478
- EPSS 0.06%
- Veröffentlicht 31.08.2012 18:55:05
- Zuletzt bearbeitet 11.04.2025 00:51:21
rssh 2.3.3 and earlier allows local users to bypass intended restricted shell access via crafted environment variables in the command line.
- EPSS 2.56%
- Veröffentlicht 23.10.2004 04:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
Format string vulnerability in log.c in rssh before 2.2.2 allows remote authenticated users to execute arbitrary code.