Remote Command Injection in libssh Versions Prior to 0.9.3 and 0.8.8
CVE-2019-14889
7.1HIGH
Summary
A security flaw exists in the libssh API function ssh_scp_new(), which is found in versions before 0.9.3 and 0.8.8. When the libssh SCP client connects to a server, the scp command executed on the server can include a user-defined path. If implemented in a manner that allows user influence over the function's third parameter, an attacker may gain the ability to inject arbitrary commands. This vulnerability poses a risk of compromising the remote target, resulting in unauthorized access and potential data breaches.
Affected Version(s)
libssh All libssh versions before 0.9.3
libssh All libssh versions before 0.8.8
References
CVSS V3.1
Score:
7.1
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
Low
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved