** DISPUTED ** scp in OpenSSH through 8.3p1 allows command injection in the scp.c toremote function, as demonstrated by backtick characters in the destination argument. NOTE: the vendor reportedly has stated that they intentionally omit validation of "anomalous argument transfers" because that could "stand a great chance of breaking existing workflows."
References
Link | Resource |
---|---|
https://github.com/cpandya2909/CVE-2020-15778/ | Exploit Third Party Advisory |
https://www.openssh.com/security.html | Vendor Advisory |
https://security.netapp.com/advisory/ntap-20200731-0007/ | Third Party Advisory |
https://news.ycombinator.com/item?id=25005567 | Third Party Advisory |
https://security.gentoo.org/glsa/202212-06 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
|
Information
Published : 2020-07-24 07:15
Updated : 2023-02-24 11:43
NVD link : CVE-2020-15778
Mitre link : CVE-2020-15778
JSON object : View
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Products Affected
netapp
- hci_compute_node
- a700s
- a700s_firmware
- active_iq_unified_manager
- solidfire
- steelstore_cloud_integrated_storage
- hci_management_node
- hci_storage_node
openbsd
- openssh
broadcom
- fabric_operating_system