7.5
CVSSv2

CVE-2019-3463

Published: 06/02/2019 Updated: 07/11/2023
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

It exists that rssh incorrectly handled certain command-line arguments and environment variables. An authenticated user could bypass rssh’s command restrictions, allowing an malicious user to run arbitrary commands.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

pizzashack rssh 2.3.4

debian debian linux 8.0

debian debian linux 9.0

fedoraproject fedora 29

fedoraproject fedora 30

fedoraproject fedora 31

canonical ubuntu linux 18.04

canonical ubuntu linux 18.10

canonical ubuntu linux 14.04

canonical ubuntu linux 16.04

Vendor Advisories

rssh could be made to run arbitrary commands if it received specially crafted input ...
Insufficient sanitation of environment variables passed to rsync can bypass the restrictions imposed by rssh, a restricted shell that should restrict users to perform only rsync operations, resulting in the execution of arbitrary shell commands (CVE-2019-3464) Insufficient sanitation of arguments passed to rsync can bypass the restrictions imposed ...

Exploits

An upgrade account is included in the IoT Controller OVA that provides the vendor undocumented access via Secure Copy (SCP) ...