CVE-2020-15778

Name
CVE-2020-15778
Description
** DISPUTED ** scp in OpenSSH through 8.3p1 allows command injection in the scp.c toremote function, as demonstrated by backtick characters in the destination argument. NOTE: the vendor reportedly has stated that they intentionally omit validation of "anomalous argument transfers" because that could "stand a great chance of breaking existing workflows."
NVD Severity
medium
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
Exploit https://github.com/cpandya2909/CVE-2020-15778/
Vendor Advisory https://www.openssh.com/security.html
Third Party Advisory https://security.netapp.com/advisory/ntap-20200731-0007/
Third Party Advisory https://news.ycombinator.com/item?id=25005567

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:* openssh >= None < 8.3

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
openssh 3.10-main 8.1_p1-r0 Natanael Copa <ncopa@alpinelinux.org> possibly vulnerable
openssh 3.11-main 8.1_p1-r1 Natanael Copa <ncopa@alpinelinux.org> possibly vulnerable