• CVE-2020-15778

发布时间: 2021年10月15日

修改时间: 2024年10月31日

概要

scp in OpenSSH through 8.3p1 allows command injection in scp.c remote function, as demonstrated by backtick characters in the destination argument. NOTE: the vendor reportedly has stated that they intentionally omit validation of anomalous argument transfers because that could stand a great chance of breaking existing workflows. This is a temporary evasion solution that filters the SCP command parameters with special characters to reduce the risk of command injection. To make the changes take effect, add StrictScpCheck yes to the /etc/ssh/sshd_config configuration file and run the systemctl restart sshd command to restart the service.

CVSS v3 指标

NVD openEuler
Confidentiality High High
Attack Vector Adjacent Local
CVSS评分 7.4 7.8
Attack Complexity Low Low
Privileges Required Low None
Scope Unchanged Unchanged
Integrity High High
User Interaction Required Required
Availability High High

安全公告

公告名 概要 发布时间
KylinSec-SA-2021-1376 openssh security update 2021年10月15日

影响产品

产品 状态
KY3.4-4A openssh Fixed