Vulnerability Details : CVE-2007-6415
scponly 4.6 and earlier allows remote authenticated users to bypass intended restrictions and execute arbitrary code by invoking scp, as implemented by OpenSSH, with the -F and -o options.
Vulnerability category: Execute code
Products affected by CVE-2007-6415
- cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
Threat overview for CVE-2007-6415
Top countries where our scanners detected CVE-2007-6415
Top open port discovered on systems with this issue
5555
IPs affected by CVE-2007-6415 121
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2007-6415!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2007-6415
1.22%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 85 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2007-6415
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
8.5
|
HIGH | AV:N/AC:L/Au:S/C:C/I:C/A:N |
8.0
|
9.2
|
NIST |
CWE ids for CVE-2007-6415
-
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.Assigned by: nvd@nist.gov (Primary)
References for CVE-2007-6415
-
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00595.html
-
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00546.html
-
http://bugs.gentoo.org/show_bug.cgi?id=203099
-
http://security.gentoo.org/glsa/glsa-200802-06.xml
-
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=437148
Exploit
Jump to