Insufficient sanitization of arguments passed to rsync can bypass the restrictions imposed by rssh, a restricted shell that should restrict users to perform only rsync operations, resulting in the execution of arbitrary shell commands.
References
Link | Resource |
---|---|
http://seclists.org/fulldisclosure/2021/May/78 | Mailing List Not Applicable Third Party Advisory |
http://www.securityfocus.com/bid/106839 | Third Party Advisory VDB Entry |
https://lists.debian.org/debian-lts-announce/2019/02/msg00007.html | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HO3MDU3AH5SLYBKHH5PJ6PHC63ASIF42/ | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KR2OHTHMJVV4DO3HDRFQQZ5JENHDJQEN/ | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T42YYNWJZG422GATWAHAEK4A24OKY557/ | |
https://security.gentoo.org/glsa/202007-29 | Third Party Advisory |
https://tracker.debian.org/news/1026713/accepted-rssh-234-5deb9u2-source-amd64-into-stable-embargoed-stable/ | Third Party Advisory |
https://usn.ubuntu.com/3946-1/ | Third Party Advisory |
https://www.debian.org/security/2019/dsa-4382 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
28 May 2021, 19:57
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:* cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:* cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:* cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:* |
|
References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KR2OHTHMJVV4DO3HDRFQQZ5JENHDJQEN/ - Mailing List, Third Party Advisory | |
References | (UBUNTU) https://usn.ubuntu.com/3946-1/ - Third Party Advisory | |
References | (GENTOO) https://security.gentoo.org/glsa/202007-29 - Third Party Advisory | |
References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T42YYNWJZG422GATWAHAEK4A24OKY557/ - Mailing List, Third Party Advisory | |
References | (FULLDISC) http://seclists.org/fulldisclosure/2021/May/78 - Mailing List, Not Applicable, Third Party Advisory | |
References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO3MDU3AH5SLYBKHH5PJ6PHC63ASIF42/ - Mailing List, Third Party Advisory |
27 May 2021, 00:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2019-02-06 19:29
Updated : 2024-02-04 20:03
NVD link : CVE-2019-3463
Mitre link : CVE-2019-3463
CVE.ORG link : CVE-2019-3463
JSON object : View
Products Affected
debian
- debian_linux
canonical
- ubuntu_linux
pizzashack
- rssh
fedoraproject
- fedora
CWE
CWE-88
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')