CVE-2007-6350

scponly 4.6 and earlier allows remote authenticated users to bypass intended restrictions and execute code by invoking dangerous subcommands including (1) unison, (2) rsync, (3) svn, and (4) svnserve, as originally demonstrated by creating a Subversion (SVN) repository with malicious hooks, then using svn to trigger execution of those hooks.
References
Link Resource
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=437148
http://bugs.gentoo.org/show_bug.cgi?id=201726
http://osvdb.org/44137
http://scponly.cvs.sourceforge.net/scponly/scponly/SECURITY?view=markup
http://secunia.com/advisories/28123 Vendor Advisory
http://secunia.com/advisories/28538 Vendor Advisory
http://secunia.com/advisories/28944 Vendor Advisory
http://secunia.com/advisories/28981 Vendor Advisory
http://security.gentoo.org/glsa/glsa-200802-06.xml
http://www.debian.org/security/2008/dsa-1473
http://www.securityfocus.com/bid/26900
http://www.securitytracker.com/id?1019103
http://www.vupen.com/english/advisories/2007/4243 Vendor Advisory
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00546.html
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00595.html
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=437148
http://bugs.gentoo.org/show_bug.cgi?id=201726
http://osvdb.org/44137
http://scponly.cvs.sourceforge.net/scponly/scponly/SECURITY?view=markup
http://secunia.com/advisories/28123 Vendor Advisory
http://secunia.com/advisories/28538 Vendor Advisory
http://secunia.com/advisories/28944 Vendor Advisory
http://secunia.com/advisories/28981 Vendor Advisory
http://security.gentoo.org/glsa/glsa-200802-06.xml
http://www.debian.org/security/2008/dsa-1473
http://www.securityfocus.com/bid/26900
http://www.securitytracker.com/id?1019103
http://www.vupen.com/english/advisories/2007/4243 Vendor Advisory
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00546.html
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00595.html
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:scponly:scponly:*:*:*:*:*:*:*:*
cpe:2.3:a:scponly:scponly:4.2:*:*:*:*:*:*:*
cpe:2.3:a:scponly:scponly:4.3:*:*:*:*:*:*:*
cpe:2.3:a:scponly:scponly:4.4:*:*:*:*:*:*:*
cpe:2.3:a:scponly:scponly:4.5:*:*:*:*:*:*:*

History

21 Nov 2024, 00:39

Type Values Removed Values Added
References () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=437148 - () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=437148 -
References () http://bugs.gentoo.org/show_bug.cgi?id=201726 - () http://bugs.gentoo.org/show_bug.cgi?id=201726 -
References () http://osvdb.org/44137 - () http://osvdb.org/44137 -
References () http://scponly.cvs.sourceforge.net/scponly/scponly/SECURITY?view=markup - () http://scponly.cvs.sourceforge.net/scponly/scponly/SECURITY?view=markup -
References () http://secunia.com/advisories/28123 - Vendor Advisory () http://secunia.com/advisories/28123 - Vendor Advisory
References () http://secunia.com/advisories/28538 - Vendor Advisory () http://secunia.com/advisories/28538 - Vendor Advisory
References () http://secunia.com/advisories/28944 - Vendor Advisory () http://secunia.com/advisories/28944 - Vendor Advisory
References () http://secunia.com/advisories/28981 - Vendor Advisory () http://secunia.com/advisories/28981 - Vendor Advisory
References () http://security.gentoo.org/glsa/glsa-200802-06.xml - () http://security.gentoo.org/glsa/glsa-200802-06.xml -
References () http://www.debian.org/security/2008/dsa-1473 - () http://www.debian.org/security/2008/dsa-1473 -
References () http://www.securityfocus.com/bid/26900 - () http://www.securityfocus.com/bid/26900 -
References () http://www.securitytracker.com/id?1019103 - () http://www.securitytracker.com/id?1019103 -
References () http://www.vupen.com/english/advisories/2007/4243 - Vendor Advisory () http://www.vupen.com/english/advisories/2007/4243 - Vendor Advisory
References () https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00546.html - () https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00546.html -
References () https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00595.html - () https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00595.html -

Information

Published : 2007-12-14 20:46

Updated : 2024-11-21 00:39


NVD link : CVE-2007-6350

Mitre link : CVE-2007-6350

CVE.ORG link : CVE-2007-6350


JSON object : View

Products Affected

scponly

  • scponly
CWE
CWE-264

Permissions, Privileges, and Access Controls

NVD-CWE-noinfo