Vulnerability Name: | CVE-2019-1000018 (CCN-157429) | ||||||||||||||||||||||||||||||||
Assigned: | 2019-01-30 | ||||||||||||||||||||||||||||||||
Published: | 2019-01-30 | ||||||||||||||||||||||||||||||||
Updated: | 2021-05-28 | ||||||||||||||||||||||||||||||||
Summary: | rssh version 2.3.4 contains a CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in allowscp permission that can result in Local command execution. This attack appear to be exploitable via An authorized SSH user with the allowscp permission. | ||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 7.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) 6.9 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:R)
6.9 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:R)
| ||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 4.6 Medium (CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-77 | ||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2019-1000018 Source: FULLDISC Type: Mailing List, Not Applicable, Third Party Advisory 20210526 KL-001-2021-007: CommScope Ruckus IoT Controller Undocumented Account Source: CCN Type: rssh Web site rssh Source: MISC Type: Exploit, Third Party Advisory https://esnet-security.github.io/vulnerabilities/20190115_rssh Source: XF Type: UNKNOWN rssh-cve20191000018-command-exec(157429) Source: CCN Type: Debian Mailing List, Wed, 30 Jan 2019 20:36:28 +0100 [SECURITY] [DLA 1650-1] rssh security update Source: MLIST Type: Mailing List, Third Party Advisory [debian-lts-announce] 20190130 [SECURITY] [DLA 1650-1] rssh security update Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2019-e47add6b2b Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2019-bfb407659e Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2019-d1487c13ac Source: GENTOO Type: Third Party Advisory GLSA-202007-29 Source: UBUNTU Type: Third Party Advisory USN-3946-1 Source: DEBIAN Type: Third Party Advisory DSA-4377 | ||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: Configuration 4: Configuration CCN 1: ![]() | ||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||
BACK |