scp in OpenSSH through 8.3p1 allows command injection in the scp.c toremote function, as demonstrated by backtick characters in the destination argument. NOTE: the vendor reportedly has stated that they intentionally omit validation of "anomalous argument transfers" because that could "stand a great chance of breaking existing workflows."
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
Link | Tags |
---|---|
https://www.openssh.com/security.html | vendor advisory |
https://github.com/cpandya2909/CVE-2020-15778/ | third party advisory exploit |
https://security.netapp.com/advisory/ntap-20200731-0007/ | third party advisory |
https://news.ycombinator.com/item?id=25005567 | third party advisory |
https://security.gentoo.org/glsa/202212-06 | third party advisory vendor advisory |
https://access.redhat.com/errata/RHSA-2024:3166 |