Operational Defect Database

BugZero found this defect 580 days ago.

F5 | 1160805

The scp-checkfp fail to cat scp.whitelist for remote admin

Last update date:

5/17/2024

Affected products:

BIG-IP

BIG-IP TMOS

Affected releases:

15.1.8.2

16.1.3.1

16.1.3.2

16.1.3.3

16.1.3.4

16.1.3.5

17.1.0

17.1.0.1

17.1.0.2

17.1.0.3

17.1.1

17.1.1.1

Fixed releases:

16.1.4

15.1.9

Description:

Bug ID 1160805: The scp-checkfp fail to cat scp.whitelist for remote admin ... Last Modified: May 17, 2024 ... Attempt SCP file to BIG-IP: /shared/images root user success remote admin user fails, following is an example: sinkhole3:~$ scp test.iso apiuser@10.201.69.106:/shared/images Password: cat: /co: No such file or directory cat: fig/ssh/scp.whitelist: No such file or directory "/shared/images/test.iso": path not allowed ... Impact ... SCP command is not working for the remote admin users. ... Conditions ... -- Running BIG-IP version with fix for ID 1097193. -- Create remote admin user. -- Use SCP command to transfer a file to remote admin user path. ... Issue is with the Internal Field Separation (IFS) environment variable from /bin/scp-checkfp file. ... Following is an example for IFS: IFS=$"\n" --> This means, it expects a string character. ... It should expect a character value to read the paths from the SCP files. ... IFS=$'\n' --> This means, it expects a character. ... Be...

Additional Resources / Links

Share:

BugZero® Risk Score

What's this?

Coming soon

Status

Verified

Learn More

Search:

...