Vulnerability CVE-2007-6350


Published: 2007-12-14   Modified: 2012-02-12

Description:
scponly 4.6 and earlier allows remote authenticated users to bypass intended restrictions and execute code by invoking dangerous subcommands including (1) unison, (2) rsync, (3) svn, and (4) svnserve, as originally demonstrated by creating a Subversion (SVN) repository with malicious hooks, then using svn to trigger execution of those hooks.

Type:

CWE-noinfo

CVSS2 => (AV:N/AC:M/Au:S/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
8.5/10
10/10
6.8/10
Exploit range
Attack complexity
Authentication
Remote
Medium
Single time
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete
Affected software
Scponly -> Scponly 

 References:
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00595.html
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00546.html
http://www.vupen.com/english/advisories/2007/4243
http://www.securitytracker.com/id?1019103
http://www.securityfocus.com/bid/26900
http://www.debian.org/security/2008/dsa-1473
http://security.gentoo.org/glsa/glsa-200802-06.xml
http://secunia.com/advisories/28981
http://secunia.com/advisories/28944
http://secunia.com/advisories/28538
http://secunia.com/advisories/28123
http://scponly.cvs.sourceforge.net/scponly/scponly/SECURITY?view=markup
http://osvdb.org/44137
http://bugs.gentoo.org/show_bug.cgi?id=201726
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=437148

Copyright 2024, cxsecurity.com

 

Back to Top