| Vulnerability Name: | CVE-2019-3464 (CCN-157395) | ||||||||||||||||||||||||||||||||
| Assigned: | 2018-12-31 | ||||||||||||||||||||||||||||||||
| Published: | 2019-02-05 | ||||||||||||||||||||||||||||||||
| Updated: | 2021-07-21 | ||||||||||||||||||||||||||||||||
| Summary: | Insufficient sanitization of environment variables passed to rsync can bypass the restrictions imposed by rssh, a restricted shell that should restrict users to perform only rsync operations, resulting in the execution of arbitrary shell commands. | ||||||||||||||||||||||||||||||||
| CVSS v3 Severity: | 9.8 Critical (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) 8.5 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
8.5 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||
| CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||||||||||||||||||||||||||
| Vulnerability Type: | CWE-20 | ||||||||||||||||||||||||||||||||
| Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||||||||||
| References: | Source: MITRE Type: CNA CVE-2019-3464 Source: FULLDISC Type: Mailing List, Not Applicable, Third Party Advisory 20210526 KL-001-2021-007: CommScope Ruckus IoT Controller Undocumented Account Source: BID Type: Third Party Advisory, VDB Entry 106839 Source: XF Type: UNKNOWN rssh-cve20193464-cmd-exec(157395) Source: CCN Type: Debian Mailing List, Tue, 5 Feb 2019 16:28:24 -0500 rssh security update Source: MLIST Type: Mailing List, Third Party Advisory [debian-lts-announce] 20190206 [SECURITY] [DLA 1660-1] rssh security update Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2019-e47add6b2b Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2019-bfb407659e Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2019-d1487c13ac Source: CCN Type: Debian Web site Source Package: rssh Source: GENTOO Type: Third Party Advisory GLSA-202007-29 Source: MISC Type: Mailing List, Third Party Advisory https://tracker.debian.org/news/1026713/accepted-rssh-234-5deb9u2-source-amd64-into-stable-embargoed-stable/ Source: UBUNTU Type: Third Party Advisory USN-3946-1 Source: DEBIAN Type: Third Party Advisory DSA-4382 | ||||||||||||||||||||||||||||||||
| Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: Configuration 4: Denotes that component is vulnerable | ||||||||||||||||||||||||||||||||
| Oval Definitions | |||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||
| BACK | |||||||||||||||||||||||||||||||||