[v2.7] lsyncd: command injection (CVE-2014-8990)
default-rsyncssh.lua in Lsyncd 2.1.5 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in a filename.
References:
•CONFIRM: http://seclists.org/oss-sec/2014/q4/699
•MLIST:[oss-security] 20141119 CVE request: lsyncd command injection
•URL: http://www.openwall.com/lists/oss-security/2014/11/19/1
•MLIST:[oss-security] 20141120 Re: CVE request: lsyncd command
injection
•URL: http://www.openwall.com/lists/oss-security/2014/11/20/5
•CONFIRM:
https://github.com/axkibe/lsyncd/commit/18f02ad013b41a72753912155ae2ba72f2a53e52
•CONFIRM:
https://github.com/axkibe/lsyncd/commit/e6016b3748370878778b8f0b568d5281cc248aa4
•CONFIRM: https://github.com/axkibe/lsyncd/issues/220
•FEDORA:FEDORA-2014-15373
•URL:
http://lists.fedoraproject.org/pipermail/package-announce/2014-December/145131.html
•FEDORA:FEDORA-2014-15393
•URL:
http://lists.fedoraproject.org/pipermail/package-announce/2014-December/145114.html
•BID:71179
•URL: http://www.securityfocus.com/bid/71179
(from redmine: issue id 3721, created on 2015-01-23, closed on 2017-09-05)
- Relations:
- parent #3719