Remote Command Injection in libssh Versions Prior to 0.9.3 and 0.8.8
CVE-2019-14889

7.1HIGH

Key Information:

Vendor
Red Hat
Status
Vendor
CVE Published:
10 December 2019

Summary

A security flaw exists in the libssh API function ssh_scp_new(), which is found in versions before 0.9.3 and 0.8.8. When the libssh SCP client connects to a server, the scp command executed on the server can include a user-defined path. If implemented in a manner that allows user influence over the function's third parameter, an attacker may gain the ability to inject arbitrary commands. This vulnerability poses a risk of compromising the remote target, resulting in unauthorized access and potential data breaches.

Affected Version(s)

libssh All libssh versions before 0.9.3

libssh All libssh versions before 0.8.8

References

CVSS V3.1

Score:
7.1
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
Low
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.