CVE-2020-15778
NixOS vulnerability analysis and mitigation

Overview

A vulnerability was discovered in OpenSSH through version 8.3p1 that allows command injection in the scp.c toremote function. The vulnerability, identified as CVE-2020-15778, was discovered on June 9, 2020, and publicly disclosed on July 18, 2020. The issue specifically affects the scp program when using backtick characters in the destination argument (GitHub POC).

Technical details

The vulnerability exists in the scp program's handling of file paths during remote file copying operations. When copying files to a remote server, the file path is appended at the end of the local scp command without proper sanitization. An attacker can exploit this by passing a backtick-enabled payload as a filename, which gets executed by the local shell during the scp command execution (GitHub POC).

Impact

The vulnerability allows an authenticated user to perform command injection on remote servers through carefully crafted filenames containing backtick characters. This could potentially lead to unauthorized command execution on the remote system with the privileges of the authenticated user (GitHub POC, NetApp Advisory).

Mitigation and workarounds

The OpenSSH vendor has stated that they intentionally omit validation of 'anomalous argument transfers' as it could 'stand a great chance of breaking existing workflows.' Users are advised to use rsync or alternative secure file transfer methods if they are concerned about this vulnerability. The vendor considers this a feature rather than a security issue (CVE Mitre, OpenSSH Security).

Community reactions

The vulnerability has been disputed within the security community. NetApp initially rated this vulnerability but later changed their CVSS score to 0.0, indicating they no longer consider it a security vulnerability (NetApp Advisory). The OpenSSH team's position is that the scp command relies on a historical protocol (called rcp) which makes it difficult to add security features without breaking existing workflows.

Additional resources


SourceThis report was generated using AI

Related NixOS vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-32318HIGH8.8
  • NixOSNixOS
  • android
NoNoSep 05, 2025
CVE-2025-32320HIGH7.8
  • NixOSNixOS
  • android
NoNoSep 05, 2025
CVE-2025-32317MEDIUM5.5
  • NixOSNixOS
  • android
NoNoSep 05, 2025
CVE-2025-32316MEDIUM5.5
  • NixOSNixOS
  • android
NoNoSep 05, 2025
CVE-2025-26461LOW3.3
  • NixOSNixOS
  • android
NoNoSep 05, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management