A flaw was found with the libssh API function ssh_scp_new() in versions before 0.9.3 and before 0.8.8. When the libssh SCP client connects to a server, the scp command, which includes a user-provided path, is executed on the server-side. In case the library is used in a way where users can influence the third parameter of the function, it would become possible for an attacker to inject arbitrary commands, leading to a compromise of the remote target.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
History
30 May 2023, 00:15
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 9.3
v3 : 8.8 |
References |
|
Information
Published : 2019-12-10 23:15
Updated : 2024-02-04 20:39
NVD link : CVE-2019-14889
Mitre link : CVE-2019-14889
CVE.ORG link : CVE-2019-14889
JSON object : View
Products Affected
debian
- debian_linux
libssh
- libssh
canonical
- ubuntu_linux
opensuse
- leap
oracle
- mysql_workbench
fedoraproject
- fedora
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')