VuXML ID | Description |
65b25acc-e63b-11e1-b81c-001b77d09812 | rssh -- arbitrary command execution
Derek Martin (rssh maintainer) reports:
Henrik Erkkonen has discovered that, through clever
manipulation of environment variables on the ssh command
line, it is possible to circumvent rssh. As far as I can
tell, there is no way to effect a root compromise, except of
course if the root account is the one you're attempting to
protect with rssh...
Discovery 2012-05-08 Entry 2012-08-22 rssh
< 2.3.4
53430
CVE-2012-3478
http://sourceforge.net/mailarchive/message.php?msg_id=29235647
|
a4598875-ec91-11e1-8bd8-0022156e8794 | rssh -- configuration restrictions bypass
Derek Martin (rssh maintainer) reports:
John Barber reported a problem where, if the system
administrator misconfigures rssh by providing too few access
bits in the configuration file, the user will be given
default permissions (scp) to the entire system, potentially
circumventing any configured chroot. Fixing this required a
behavior change: in the past, using rssh without a config
file would give all users default access to use scp on an
unchrooted system. In order to correct the reported bug,
this feature has been eliminated, and you must now have a
valid configuration file. If no config file exists, all
users will be locked out.
Discovery 2010-08-01 Entry 2012-08-22 rssh
< 2.3.3
http://www.pizzashack.org/rssh/security.shtml
|
d193aa9f-3f8c-11e9-9a24-6805ca0b38e8 | rssh - multiple vulnerabilities
NVD reports:
rssh version 2.3.4 contains a CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in allowscp permission that can result in Local command execution. This attack appear to be exploitable via An authorized SSH user with the allowscp permission.
Insufficient sanitization of arguments passed to rsync can bypass the restrictions imposed by rssh, a restricted shell that should restrict users to perform only rsync operations, resulting in the execution of arbitrary shell commands.
Discovery 2019-02-04 Entry 2019-03-06 rssh
< 2.3.4_2
https://nvd.nist.gov/vuln/search/results?form_type=Advanced&cves=on&cpe_version=cpe%3a%2fa%3apizzashack%3arssh%3a2.3.4
CVE-2019-1000018
CVE-2019-3463
CVE-2019-3464
|