logo
Vulnerability feed
CONTRIBUTE

Vulnerability

warn

CVE-2020-15778

Reference to the description:

https://nvd.nist.gov/vuln/detail/CVE-2020-15778

Description:
scp in OpenSSH through 8.3p1 allows command injection in the scp.c toremote function, as demonstrated by backtick characters in the destination argument. NOTE: the vendor reportedly has stated that they intentionally omit validation of "anomalous argument transfers" because that could "stand a great chance of breaking existing workflows."
Last updated date:
08/04/2024
Type:
exploit
Confidence:
HIGH
Date of publishing:
07/18/2020
Reference url to background

https://github.com/cpandya2909/CVE-2020-15778

Type:
exploit
Confidence:
HIGH
Date of publishing:
06/22/2021
Type:
exploit
Confidence:
HIGH
Date of publishing:
07/15/2021
Type:
exploit
Confidence:
HIGH
Date of publishing:
07/15/2021
Vulnerability FeedContributorsAboutBlog

@inTheWild

©2024

Privacy Policy