[FREEBSD:1E7FA41B-F6CA-4FE8-BD46-0E176B42B14F] libssh -- Unsanitized location in scp could lead to unwanted command execution

Severity High
Affected Packages 1
CVEs 1

The libssh team reports:

  In an environment where a user is only allowed to copy files and
    not to execute applications, it would be possible to pass a location
    which contains commands to be executed in additon.
  When the libssh SCP client connects to a server, the scp
    command, which includes a user-provided path, is executed
    on the server-side. In case the library is used in a way
    where users can influence the third parameter of
    ssh_scp_new(), it would become possible for an attacker to
    inject arbitrary commands, leading to a compromise of the
    remote target.
Package Affected Version
pkg:freebsd/libssh < 0.8.8
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:freebsd/libssh libssh < 0.8.8
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...