scp in OpenSSH through 8.3p1 allows command injection in the scp.c toremote function, as demonstrated by backtick characters in the destination argument. NOTE: the vendor reportedly has stated that they intentionally omit validation of "anomalous argument transfers" because that could "stand a great chance of breaking existing workflows."
2020-07-24T14:15:12.450
2024-11-21T05:06:09.393
Modified
CVSSv3.1: 7.8 (HIGH)
AV:N/AC:M/Au:N/C:P/I:P/A:P
8.6
6.4
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | openbsd | openssh | < 8.3 | Yes |
Application | openbsd | openssh | 8.3 | Yes |
Application | openbsd | openssh | 8.3 | Yes |
Operating System | netapp | a700s_firmware | - | Yes |
Hardware | netapp | a700s | - | No |
Application | netapp | active_iq_unified_manager | ≥ 9.5 | Yes |
Application | netapp | hci_management_node | - | Yes |
Application | netapp | solidfire | - | Yes |
Application | netapp | steelstore_cloud_integrated_storage | - | Yes |
Hardware | netapp | hci_compute_node | - | Yes |
Hardware | netapp | hci_storage_node | - | Yes |
Operating System | broadcom | fabric_operating_system | - | Yes |