CVE-2020-15778

scp in OpenSSH through 8.3p1 allows command injection in the scp.c toremote function, as demonstrated by backtick characters in the destination argument. NOTE: the vendor reportedly has stated that they intentionally omit validation of "anomalous argument transfers" because that could "stand a great chance of breaking existing workflows."
OS Command Injection
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.8 HIGH
LOCAL
LOW
NONE
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
mitreCNA
---
---
CISA-ADPADP
7.8 HIGH
LOCAL
LOW
NONE
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 98%
VendorProductVersion
openbsdopenssh
𝑥
< 8.3
openbsdopenssh
8.3
openbsdopenssh
8.3:p1
netappa700s_firmware
-
netappactive_iq_unified_manager
9.5 ≤
netapphci_management_node
-
netappsolidfire
-
netappsteelstore_cloud_integrated_storage
-
netapphci_compute_node
-
netapphci_storage_node
-
broadcomfabric_operating_system
-
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
openssh
bullseye (security)
unimportant
bullseye
unimportant
bookworm
unimportant
bookworm (security)
unimportant
sid
unimportant
trixie
unimportant
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
openssh
focal
ignored
bionic
ignored
xenial
ignored
trusty
ignored
openssh-ssh1
focal
ignored
bionic
ignored
xenial
dne
trusty
dne