FreeSSHd 1.3.1 version is vulnerable to an Unquoted Path Service allowing local users to launch processes with elevated privileges.
The product uses a search path that contains an unquoted element, in which the element contains whitespace or other separators. This can cause the product to access resources in a parent path.
Link | Tags |
---|---|
https://github.com/lajarajorge/CVE-2017-1000475/blob/master/README.md | third party advisory exploit |
https://www.exploit-db.com/exploits/48044 | exploit |