CVE-2020-15778

SOURCE - nist

Summary

scp in OpenSSH through 8.3p1 allows command injection in the scp.c toremote function, as demonstrated by backtick characters in the destination argument. NOTE: the vendor reportedly has stated that they intentionally omit validation of "anomalous argument transfers" because that could "stand a great chance of breaking existing workflows."

EPSS Score: 0.00411 (0.738)

Common Weakness Enumeration (CWE)

SOURCE - nist

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

SOURCE - redhat

Improper Neutralization of Special Elements used in a Command ('Command Injection')


debian

CREATED


UPDATED



EXPLOITABILITY SCORE

-


EXPLOITS FOUND
-

COMMON WEAKNESS ENUMERATION (CWE)-

CVSS SCORE

N/Alow
PackageTypeOS NameOS VersionAffected RangesFix Versions
debian/opensshdebdebian12>=1:9.2p1-2+deb12u2Not yet available
debian/opensshdebdebianunstable>=1:9.7p1-5Not yet available
debian/opensshdebdebian11>=1:8.4p1-5+deb11u3Not yet available
debian/opensshdebdebian13>=1:9.7p1-5Not yet available
debian/opensshdebdebian10>=1:7.9p1-10+deb10u2Not yet available

Severity and metrics

No CVSS data available from this source.

nist

CREATED


UPDATED



EXPLOITABILITY SCORE

1.8


EXPLOITS FOUND

COMMON WEAKNESS ENUMERATION (CWE)

CVSS SCORE

7.8high

ubuntu

CREATED


UPDATED



EXPLOITABILITY SCORE

1.8


EXPLOITS FOUND
-

COMMON WEAKNESS ENUMERATION (CWE)-

CVSS SCORE

7.8low

redhat

CREATED


UPDATED



EXPLOITABILITY SCORE

1.8


EXPLOITS FOUND
-

COMMON WEAKNESS ENUMERATION (CWE)

CVSS SCORE

7.8medium

inthewild

CREATED


UPDATED



EXPLOITABILITY SCORE

-


EXPLOITS FOUND

-


COMMON WEAKNESS ENUMERATION (CWE)-
RATING UNAVAILABLE FROM SOURCE