Remote Command Injection in libssh Versions Prior to 0.9.3 and 0.8.8
CVE-2019-14889

7.1HIGH

Key Information:

Vendor

Red Hat

Status
Vendor
CVE Published:
10 December 2019

What is CVE-2019-14889?

A security flaw exists in the libssh API function ssh_scp_new(), which is found in versions before 0.9.3 and 0.8.8. When the libssh SCP client connects to a server, the scp command executed on the server can include a user-defined path. If implemented in a manner that allows user influence over the function's third parameter, an attacker may gain the ability to inject arbitrary commands. This vulnerability poses a risk of compromising the remote target, resulting in unauthorized access and potential data breaches.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

libssh All libssh versions before 0.9.3

libssh All libssh versions before 0.8.8

References

CVSS V3.1

Score:
7.1
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
Low
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.