{"dataType":"CVE_RECORD","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2020-15778","assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","dateUpdated":"2024-08-04T13:22:30.831Z","dateReserved":"2020-07-15T00:00:00.000Z","datePublished":"2020-07-24T00:00:00.000Z"},"containers":{"cna":{"providerMetadata":{"orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre","dateUpdated":"2024-06-04T16:53:15.270Z"},"descriptions":[{"lang":"en","value":"scp in OpenSSH through 8.3p1 allows command injection in the scp.c toremote function, as demonstrated by backtick characters in the destination argument. NOTE: the vendor reportedly has stated that they intentionally omit validation of \"anomalous argument transfers\" because that could \"stand a great chance of breaking existing workflows.\""}],"tags":["disputed"],"affected":[{"vendor":"n/a","product":"n/a","versions":[{"version":"n/a","status":"affected"}]}],"references":[{"url":"https://www.openssh.com/security.html"},{"url":"https://github.com/cpandya2909/CVE-2020-15778/"},{"url":"https://security.netapp.com/advisory/ntap-20200731-0007/"},{"url":"https://news.ycombinator.com/item?id=25005567"},{"name":"GLSA-202212-06","tags":["vendor-advisory"],"url":"https://security.gentoo.org/glsa/202212-06"},{"url":"https://access.redhat.com/errata/RHSA-2024:3166"}],"problemTypes":[{"descriptions":[{"type":"text","lang":"en","description":"n/a"}]}]},"adp":[{"title":"CISA ADP Vulnrichment","metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":7.8,"attackVector":"LOCAL","baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","integrityImpact":"HIGH","userInteraction":"REQUIRED","attackComplexity":"LOW","availabilityImpact":"HIGH","privilegesRequired":"NONE","confidentialityImpact":"HIGH"}},{"other":{"type":"ssvc","content":{"id":"CVE-2020-15778","role":"CISA Coordinator","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"total"}],"version":"2.0.3","timestamp":"2024-05-01T14:59:02.714297Z"}}}],"affected":[{"cpes":["cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*"],"vendor":"openbsd","product":"openssh","versions":[{"status":"affected","version":"0","versionType":"custom","lessThanOrEqual":"8.3p1"}],"defaultStatus":"unknown"}],"problemTypes":[{"descriptions":[{"lang":"en","type":"CWE","cweId":"CWE-78","description":"CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')"}]}],"providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-06-04T17:12:18.895Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-04T13:22:30.831Z"},"title":"CVE Program Container","references":[{"url":"https://www.openssh.com/security.html","tags":["x_transferred"]},{"url":"https://github.com/cpandya2909/CVE-2020-15778/","tags":["x_transferred"]},{"url":"https://security.netapp.com/advisory/ntap-20200731-0007/","tags":["x_transferred"]},{"url":"https://news.ycombinator.com/item?id=25005567","tags":["x_transferred"]},{"name":"GLSA-202212-06","tags":["vendor-advisory","x_transferred"],"url":"https://security.gentoo.org/glsa/202212-06"},{"url":"https://access.redhat.com/errata/RHSA-2024:3166","tags":["x_transferred"]}]}]},"dataVersion":"5.1"}