CVE-2016-6902

Published on: 04/24/2017 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:27:11 PM UTC

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

Certain versions of Lshell from Lshell Project contain the following vulnerability:

lshell 0.9.16 allows remote authenticated users to break out of a limited shell and execute arbitrary commands.

  • CVE-2016-6902 has been assigned by [email protected] to track the vulnerability - currently rated as - currently rated as CRITICAL severity.

CVSS3 Score: 9.9 - CRITICAL

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
NETWORK LOW LOW NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
CHANGED HIGH HIGH HIGH

CVSS2 Score: 9 - HIGH

Access
Vector
Access
Complexity
Authentication
NETWORK LOW SINGLE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
COMPLETE COMPLETE COMPLETE

CVE References

Description Tags Link
1369345 – (CVE-2016-6902, CVE-2016-6903) CVE-2016-6902 CVE-2016-6903 lshell: Shell outbreak vulnerabilities via bad syntax parse and multiline commands Issue Tracking
Patch
bugzilla.redhat.com
text/html
URL Logo CONFIRM bugzilla.redhat.com/show_bug.cgi?id=1369345
oss-security - Re: CVE Request: lshell: shell outbreak vulnerabilities via bad syntax parse and multiline commands Mailing List
Patch
Third Party Advisory
www.openwall.com
text/html
URL Logo MLIST [oss-security] 20160822 Re: CVE Request: lshell: shell outbreak vulnerabilities via bad syntax parse and multiline commands
Restriction overrun via simple trick · Issue #147 · ghantoos/lshell · GitHub Issue Tracking
Patch
Third Party Advisory
github.com
text/html
URL Logo CONFIRM github.com/ghantoos/lshell/issues/147
[security] parse quoted strings for possible commands (Closes #148, C… · ghantoos/[email protected] · GitHub Issue Tracking
Patch
Third Party Advisory
github.com
text/html
URL Logo CONFIRM github.com/ghantoos/lshell/commit/a686f71732a3d0f16df52ef46ab8a49ee0083c68
#834949 - lshell: CVE-2016-6902: Shell outbreak due to bad syntax parse - Debian Bug report logs Issue Tracking
Patch
Third Party Advisory
bugs.debian.org
text/html
URL Logo CONFIRM bugs.debian.org/cgi-bin/bugreport.cgi?bug=834949
lshell Multiple Security Bypass Vulnerabilities Third Party Advisory
VDB Entry
cve.report (archive)
text/html
URL Logo BID 92591

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationLshell ProjectLshell0.9.16AllAllAll
ApplicationLshell ProjectLshell0.9.16AllAllAll
  • cpe:2.3:a:lshell_project:lshell:0.9.16:*:*:*:*:*:*:*:
  • cpe:2.3:a:lshell_project:lshell:0.9.16:*:*:*:*:*:*:*: