First published: Fri Jul 24 2020(Updated: )
scp in OpenSSH through 8.3p1 allows command injection in scp.c remote function, as demonstrated by backtick characters in the destination argument. NOTE: the vendor reportedly has stated that they intentionally omit validation of "anomalous argument transfers" because that could "stand a great chance of breaking existing workflows." Reference: <a href="https://www.openssh.com/security.html">https://www.openssh.com/security.html</a>
Affected Software | Affected Version | How to fix |
---|---|---|
GSI OpenSSH | >=8.3p1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.