Vulnerability Name: | CVE-2019-3463 (CCN-157394) | ||||||||||||||||||||||||||||||||
Assigned: | 2018-12-31 | ||||||||||||||||||||||||||||||||
Published: | 2019-02-05 | ||||||||||||||||||||||||||||||||
Updated: | 2021-07-21 | ||||||||||||||||||||||||||||||||
Summary: | Insufficient sanitization of arguments passed to rsync can bypass the restrictions imposed by rssh, a restricted shell that should restrict users to perform only rsync operations, resulting in the execution of arbitrary shell commands. | ||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 9.8 Critical (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) 8.5 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
8.5 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-20 | ||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2019-3463 Source: FULLDISC Type: Mailing List, Not Applicable, Third Party Advisory 20210526 KL-001-2021-007: CommScope Ruckus IoT Controller Undocumented Account Source: BID Type: Third Party Advisory, VDB Entry 106839 Source: XF Type: UNKNOWN rssh-cve20193463-cmd-exec(157394) Source: CCN Type: Debian Mailing List, Tue, 5 Feb 2019 16:28:24 -0500 rssh security update Source: MLIST Type: Mailing List, Third Party Advisory [debian-lts-announce] 20190206 [SECURITY] [DLA 1660-1] rssh security update Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2019-e47add6b2b Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2019-bfb407659e Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2019-d1487c13ac Source: CCN Type: Debian Web site Source Package: rssh Source: GENTOO Type: Third Party Advisory GLSA-202007-29 Source: MISC Type: Third Party Advisory https://tracker.debian.org/news/1026713/accepted-rssh-234-5deb9u2-source-amd64-into-stable-embargoed-stable/ Source: UBUNTU Type: Third Party Advisory USN-3946-1 Source: DEBIAN Type: Third Party Advisory DSA-4382 | ||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: Configuration 4: ![]() | ||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||
BACK |