Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-14889

Опубликовано: 05 дек. 2019
Источник: redhat
CVSS3: 7.1
EPSS Низкий

Описание

A flaw was found with the libssh API function ssh_scp_new() in versions before 0.9.3 and before 0.8.8. When the libssh SCP client connects to a server, the scp command, which includes a user-provided path, is executed on the server-side. In case the library is used in a way where users can influence the third parameter of the function, it would become possible for an attacker to inject arbitrary commands, leading to a compromise of the remote target.

A flaw was found with the libssh API function ssh_scp_new(). A user able to connect to a server using SCP could execute arbitrary command using a user-provided path, leading to a compromise of the remote target.

Отчет

Red Hat Virtualization only uses libssh for client-side, not server-side where this vulnerability is present.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6libssh2Not affected
Red Hat Enterprise Linux 7libssh2Not affected
Red Hat Enterprise Linux 8libssh2Not affected
Red Hat Virtualization 4libsshNot affected
Red Hat Enterprise Linux 8libsshFixedRHSA-2020:454504.11.2020
Red Hat Enterprise Linux 8libsshFixedRHSA-2020:454504.11.2020

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-78
https://bugzilla.redhat.com/show_bug.cgi?id=1772523libssh: unsanitized location in scp could lead to unwanted command execution

EPSS

Процентиль: 79%
0.0123
Низкий

7.1 High

CVSS3

Связанные уязвимости

CVSS3: 8.8
ubuntu
около 6 лет назад

A flaw was found with the libssh API function ssh_scp_new() in versions before 0.9.3 and before 0.8.8. When the libssh SCP client connects to a server, the scp command, which includes a user-provided path, is executed on the server-side. In case the library is used in a way where users can influence the third parameter of the function, it would become possible for an attacker to inject arbitrary commands, leading to a compromise of the remote target.

CVSS3: 8.8
nvd
около 6 лет назад

A flaw was found with the libssh API function ssh_scp_new() in versions before 0.9.3 and before 0.8.8. When the libssh SCP client connects to a server, the scp command, which includes a user-provided path, is executed on the server-side. In case the library is used in a way where users can influence the third parameter of the function, it would become possible for an attacker to inject arbitrary commands, leading to a compromise of the remote target.

CVSS3: 8.8
debian
около 6 лет назад

A flaw was found with the libssh API function ssh_scp_new() in version ...

suse-cvrf
около 6 лет назад

Security update for libssh

suse-cvrf
около 6 лет назад

Security update for libssh

EPSS

Процентиль: 79%
0.0123
Низкий

7.1 High

CVSS3