Argument injection vulnerability in scponlyc in scponly 4.1 and previous versions, when both scp and rsync compatibility are enabled, allows local users to execute arbitrary applications via "getopt" style argument specifications, which are not filtered.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
scponly scponly 2.1 |
||
scponly scponly 3.0 |
||
scponly scponly 3.8 |
||
scponly scponly 3.9 |
||
scponly scponly 4.1 |
||
scponly scponly 3.11 |
||
scponly scponly 3.5 |
||
scponly scponly 2.0 |