8.5 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
SINGLE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:S/C:C/I:C/A:C
6.7 Medium
AI Score
Confidence
Low
0.021 Low
EPSS
Percentile
89.2%
scponly 4.6 and earlier allows remote authenticated users to bypass intended restrictions and execute code by invoking dangerous subcommands including (1) unison, (2) rsync, (3) svn, and (4) svnserve, as originally demonstrated by creating a Subversion (SVN) repository with malicious hooks, then using svn to trigger execution of those hooks.
bugs.debian.org/cgi-bin/bugreport.cgi?bug=437148
bugs.gentoo.org/show_bug.cgi?id=201726
osvdb.org/44137
scponly.cvs.sourceforge.net/scponly/scponly/SECURITY?view=markup
secunia.com/advisories/28123
secunia.com/advisories/28538
secunia.com/advisories/28944
secunia.com/advisories/28981
security.gentoo.org/glsa/glsa-200802-06.xml
www.debian.org/security/2008/dsa-1473
www.securityfocus.com/bid/26900
www.securitytracker.com/id?1019103
www.vupen.com/english/advisories/2007/4243
www.redhat.com/archives/fedora-package-announce/2008-February/msg00546.html
www.redhat.com/archives/fedora-package-announce/2008-February/msg00595.html