Vulnerability Name: | CVE-2007-6350 (CCN-39069) | ||||||||||||||||
Assigned: | 2007-08-10 | ||||||||||||||||
Published: | 2007-08-10 | ||||||||||||||||
Updated: | 2011-08-08 | ||||||||||||||||
Summary: | scponly 4.6 and earlier allows remote authenticated users to bypass intended restrictions and execute code by invoking dangerous subcommands including (1) unison, (2) rsync, (3) svn, and (4) svnserve, as originally demonstrated by creating a Subversion (SVN) repository with malicious hooks, then using svn to trigger execution of those hooks. | ||||||||||||||||
CVSS v3 Severity: | 3.5 Low (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N)
| ||||||||||||||||
CVSS v2 Severity: | 8.5 High (CVSS v2 Vector: AV:N/AC:M/Au:S/C:C/I:C/A:C) 6.7 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:S/C:C/I:C/A:C/E:POC/RL:OF/RC:C)
3.1 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:S/C:N/I:P/A:N/E:POC/RL:OF/RC:C)
| ||||||||||||||||
Vulnerability Type: | CWE-noinfo CWE-264 | ||||||||||||||||
Vulnerability Consequences: | Bypass Security | ||||||||||||||||
References: | Source: CCN Type: Debian Bug report logs - #437148 "svn", "svnserve", "unison", "rsync" passthrough is unsafe Source: CONFIRM Type: UNKNOWN http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=437148 Source: CONFIRM Type: UNKNOWN http://bugs.gentoo.org/show_bug.cgi?id=201726 Source: MITRE Type: CNA CVE-2007-6350 Source: OSVDB Type: UNKNOWN 44137 Source: CCN Type: SourceForge.net Repository View of /scponly/SECURITY Source: CONFIRM Type: UNKNOWN http://scponly.cvs.sourceforge.net/scponly/scponly/SECURITY?view=markup Source: CCN Type: SA28123 scponly Command Passthrough Security Bypass Source: SECUNIA Type: Vendor Advisory 28123 Source: CCN Type: SA28538 Debian update for scponly Source: SECUNIA Type: Vendor Advisory 28538 Source: SECUNIA Type: Vendor Advisory 28944 Source: SECUNIA Type: Vendor Advisory 28981 Source: GENTOO Type: UNKNOWN GLSA-200802-06 Source: CCN Type: SECTRACK ID: 1019103 Scponly May Let Remote Authenticated Users Execute Arbitrary Commands Source: DEBIAN Type: UNKNOWN DSA-1473 Source: DEBIAN Type: DSA-1473 scponly -- design flaw Source: CCN Type: GLSA-200802-06 scponly: Multiple vulnerabilities Source: CCN Type: OSVDB ID: 44137 scponly Multiple Subcommands Crafted Subversion (SVN) Repository Restriction Bypass Source: BID Type: UNKNOWN 26900 Source: CCN Type: BID-26900 scponly Local Arbitrary Command Execution Weakness Source: SECTRACK Type: UNKNOWN 1019103 Source: VUPEN Type: Vendor Advisory ADV-2007-4243 Source: XF Type: UNKNOWN scponly-multiple-security-bypass(39069) Source: FEDORA Type: UNKNOWN FEDORA-2008-1743 Source: FEDORA Type: UNKNOWN FEDORA-2008-1728 | ||||||||||||||||
Vulnerable Configuration: | Configuration 1:![]() | ||||||||||||||||
Oval Definitions | |||||||||||||||||
| |||||||||||||||||
BACK |