Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).
CVE-2019-3464 — Improper Initialization in GNU Linux Rssh
Severity
9.8CRITICALNVD
EPSS
10.3%
top 6.81%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedFeb 6
Latest updateApr 16
Description
Insufficient sanitization of environment variables passed to rsync can bypass the restrictions imposed by rssh, a restricted shell that should restrict users to perform only rsync operations, resulting in the execution of arbitrary shell commands.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9
Affected Packages3 packages
Also affects: Debian Linux 8.0, 9.0, Fedora 29, 30, 31, Ubuntu Linux 14.04, 16.04, 18.04, 18.10
🔴Vulnerability Details
2GHSA▶
GHSA-wp4w-52jh-8g3x: Insufficient sanitization of environment variables passed to rsync can bypass the restrictions imposed by rssh, a restricted shell that should restric↗2022-05-13
OSV▶
CVE-2019-3464: Insufficient sanitization of environment variables passed to rsync can bypass the restrictions imposed by rssh, a restricted shell that should restric↗2019-02-06
💥Exploits & PoCs
1📋Vendor Advisories
1💬Community
3Bugzilla▶
CVE-2019-3464 rssh: rsync bypass resulting in arbitrary code execution when built with popt [fedora-all]↗2019-02-04
Bugzilla▶
CVE-2019-3464 rssh: rsync bypass resulting in arbitrary code execution when built with popt↗2019-02-04
Bugzilla▶
CVE-2019-3464 rssh: rsync bypass resulting in arbitrary code execution when built with popt [epel-all]↗2019-02-04