ID CVE-2004-1162
Summary The unison command in scponly before 4.0 does not properly restrict programs that can be run, which could allow remote authenticated users to bypass intended access restrictions and execute arbitrary programs via the (1) -rshcmd or (2) -sshcmd flags.
References
Vulnerable Configurations
  • cpe:2.3:a:scponly:scponly:2.0:*:*:*:*:*:*:*
    cpe:2.3:a:scponly:scponly:2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:scponly:scponly:2.1:*:*:*:*:*:*:*
    cpe:2.3:a:scponly:scponly:2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:scponly:scponly:2.3:*:*:*:*:*:*:*
    cpe:2.3:a:scponly:scponly:2.3:*:*:*:*:*:*:*
  • cpe:2.3:a:scponly:scponly:2.4:*:*:*:*:*:*:*
    cpe:2.3:a:scponly:scponly:2.4:*:*:*:*:*:*:*
  • cpe:2.3:a:scponly:scponly:3.0:*:*:*:*:*:*:*
    cpe:2.3:a:scponly:scponly:3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:scponly:scponly:3.5:*:*:*:*:*:*:*
    cpe:2.3:a:scponly:scponly:3.5:*:*:*:*:*:*:*
  • cpe:2.3:a:scponly:scponly:3.8:*:*:*:*:*:*:*
    cpe:2.3:a:scponly:scponly:3.8:*:*:*:*:*:*:*
  • cpe:2.3:a:scponly:scponly:3.9:*:*:*:*:*:*:*
    cpe:2.3:a:scponly:scponly:3.9:*:*:*:*:*:*:*
  • cpe:2.3:a:scponly:scponly:3.11:*:*:*:*:*:*:*
    cpe:2.3:a:scponly:scponly:3.11:*:*:*:*:*:*:*
  • cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*
    cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*
CVSS
Base: 7.5 (as of 11-07-2017 - 01:30)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:P/A:P
refmap via4
bid 11791
bugtraq
  • 20041202 rssh and scponly arbitrary command execution
  • 20050115 Re: rssh and scponly arbitrary command execution
confirm http://www.sublimation.org/scponly/#relnotes
gentoo GLSA-200412-01
xf scponly-commandline-command-execution(18362)
Last major update 11-07-2017 - 01:30
Published 10-01-2005 - 05:00
Last modified 11-07-2017 - 01:30
Back to Top