CVE-2019-14889

A flaw was found with the libssh API function ssh_scp_new() in versions before 0.9.3 and before 0.8.8. When the libssh SCP client connects to a server, the scp command, which includes a user-provided path, is executed on the server-side. In case the library is used in a way where users can influence the third parameter of the function, it would become possible for an attacker to inject arbitrary commands, leading to a compromise of the remote target.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:libssh:libssh:*:*:*:*:*:*:*:*
cpe:2.3:a:libssh:libssh:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*

Configuration 5 (hide)

cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

Configuration 6 (hide)

cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:*

History

30 May 2023, 00:15

Type Values Removed Values Added
CVSS v2 : 9.3
v3 : 8.0
v2 : 9.3
v3 : 8.8
References
  • (MLIST) https://lists.debian.org/debian-lts-announce/2023/05/msg00029.html -

Information

Published : 2019-12-10 23:15

Updated : 2024-02-04 20:39


NVD link : CVE-2019-14889

Mitre link : CVE-2019-14889

CVE.ORG link : CVE-2019-14889


JSON object : View

Products Affected

debian

  • debian_linux

libssh

  • libssh

canonical

  • ubuntu_linux

opensuse

  • leap

oracle

  • mysql_workbench

fedoraproject

  • fedora
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')