CVE-2020-15778
Published: 24 July 2020
scp in OpenSSH through 8.3p1 allows command injection in the scp.c toremote function, as demonstrated by backtick characters in the destination argument. NOTE: the vendor reportedly has stated that they intentionally omit validation of "anomalous argument transfers" because that could "stand a great chance of breaking existing workflows."
Priority
CVSS 3 base score: 7.8
Status
Package | Release | Status |
---|---|---|
openssh Launchpad, Ubuntu, Debian |
Upstream |
Needs triage
|
Ubuntu 20.10 (Groovy Gorilla) |
Ignored
|
|
Ubuntu 20.04 LTS (Focal Fossa) |
Ignored
|
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Ignored
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Ignored
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Ignored
|
|
openssh-ssh1 Launchpad, Ubuntu, Debian |
Upstream |
Ignored
(frozen on openssh 7.5p)
|
Ubuntu 20.10 (Groovy Gorilla) |
Ignored
|
|
Ubuntu 20.04 LTS (Focal Fossa) |
Ignored
|
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Ignored
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Does not exist
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
|
Notes
Author | Note |
---|---|
seth-arnold | openssh-ssh1 is provided for compatibility with old devices that cannot be upgraded to modern protocols. Thus we may not provide security support for this package if doing so would prevent access to equipment. |
mdeslaur | the upstream OpenSSH project will not be fixing this issue as it may result in breaking existing workflows. As such, we will not be fixing this issue in Ubuntu. |
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15778
- https://github.com/cpandya2909/CVE-2020-15778
- https://www.openssh.com/security.html
- https://lwn.net/Articles/835962/
- NVD
- Launchpad
- Debian