First published: Tue Apr 22 2003(Updated: )
scponly does not properly verify the path when finding the (1) scp or (2) sftp-server programs, which could allow remote authenticated users to bypass access controls by uploading malicious programs and modifying the PATH variable in $HOME/.ssh/environment to locate those programs.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Scponly Scponly | =2.3 | |
Scponly Scponly | =2.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-1469 has a moderate severity rating due to its potential to allow remote authenticated users to bypass access controls.
To fix CVE-2002-1469, upgrade to scponly versions 2.5 or later, which address the path verification issue.
Users of scponly versions 2.3 and 2.4 are affected by CVE-2002-1469.
CVE-2002-1469 can enable attacks where an authenticated user uploads harmful programs by manipulating the PATH variable.
Yes, CVE-2002-1469 is related to SSH security as it involves vulnerabilities within the scponly restriction mechanism for SSH users.