CVE-2020-15778

Name
CVE-2020-15778
Description
scp in OpenSSH through 8.3p1 allows command injection in the scp.c toremote function, as demonstrated by backtick characters in the destination argument. NOTE: the vendor reportedly has stated that they intentionally omit validation of "anomalous argument transfers" because that could "stand a great chance of breaking existing workflows."
NVD Severity
unknown
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
Exploit https://github.com/cpandya2909/CVE-2020-15778/
Vendor Advisory https://www.openssh.com/security.html
Third Party Advisory https://security.netapp.com/advisory/ntap-20200731-0007/
Third Party Advisory https://news.ycombinator.com/item?id=25005567
vendor-advisory https://security.gentoo.org/glsa/202212-06
cve@mitre.org https://access.redhat.com/errata/RHSA-2024:3166

Match rules

CPE URI Source package Min version Max version
n/a == n/a == n/a

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
openssh 3.10-main 8.1_p1-r0 Natanael Copa <ncopa@alpinelinux.org> possibly vulnerable
openssh 3.11-main 8.1_p1-r1 Natanael Copa <ncopa@alpinelinux.org> possibly vulnerable