Description
Insufficient sanitization of arguments passed to rsync can bypass the restrictions imposed by rssh, a restricted shell that should restrict users to perform only rsync operations, resulting in the execution of arbitrary shell commands.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1660-1 | rssh security update |
Debian DSA |
DSA-4382-1 | rssh security update |
EUVD |
EUVD-2019-13102 | Insufficient sanitization of arguments passed to rsync can bypass the restrictions imposed by rssh, a restricted shell that should restrict users to perform only rsync operations, resulting in the execution of arbitrary shell commands. |
Ubuntu USN |
USN-3946-1 | rssh vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: debian
Published:
Updated: 2024-09-17T01:31:33.198Z
Reserved: 2018-12-31T00:00:00.000Z
Link: CVE-2019-3463
No data.
Status : Modified
Published: 2019-02-06T19:29:00.350
Modified: 2024-11-21T04:42:05.797
Link: CVE-2019-3463
No data.
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
Debian DSA
EUVD
Ubuntu USN