Argument injection vulnerability in scponlyc in scponly 4.1 and earlier, when both scp and rsync compatibility are enabled, allows local users to execute arbitrary applications via getopt style argument specifications, which are not filtered.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Scponly | Scponly | 2.0 (including) | 2.0 (including) |
Scponly | Scponly | 2.1 (including) | 2.1 (including) |
Scponly | Scponly | 3.0 (including) | 3.0 (including) |
Scponly | Scponly | 3.5 (including) | 3.5 (including) |
Scponly | Scponly | 3.8 (including) | 3.8 (including) |
Scponly | Scponly | 3.9 (including) | 3.9 (including) |
Scponly | Scponly | 3.11 (including) | 3.11 (including) |
Scponly | Scponly | 4.1 (including) | 4.1 (including) |
Scponly | Ubuntu | dapper | * |
Scponly | Ubuntu | devel | * |
Scponly | Ubuntu | edgy | * |
Scponly | Ubuntu | feisty | * |