2.4 KiB
2.4 KiB
CVE-2019-6111
Description
An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned (only directory traversal attacks are prevented). A malicious scp server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the scp client target directory. If recursive operation (-r) is performed, the server can manipulate subdirectories as well (for example, to overwrite the .ssh/authorized_keys file).
POC
Reference
- https://bugzilla.redhat.com/show_bug.cgi?id=1677794
- https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt
- https://www.exploit-db.com/exploits/46193/
- https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
Github
- https://github.com/0xT11/CVE-POC
- https://github.com/53n7hu/SNP
- https://github.com/ARPSyndicate/cvemon
- https://github.com/AntonVanAssche/CSV-NPE2223
- https://github.com/Fastiraz/openssh-cve-resolv
- https://github.com/InesMartins31/iot-cves
- https://github.com/KorayAgaya/TrivyWeb
- https://github.com/Mohzeela/external-secret
- https://github.com/TommasoBilotta/public
- https://github.com/bigb0x/CVE-2024-6387
- https://github.com/bigb0x/OpenSSH-Scanner
- https://github.com/bioly230/THM_Skynet
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/firatesatoglu/iot-searchengine
- https://github.com/firatesatoglu/shodanSearch
- https://github.com/h4xrOx/Direct-Admin-Vulnerability-Disclosure
- https://github.com/hectorgie/PoC-in-GitHub
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/retr0-13/cveScannerV2
- https://github.com/ryanalieh/openSSH-scanner
- https://github.com/scmanjarrez/CVEScannerV2
- https://github.com/siddharthraopotukuchi/trivy
- https://github.com/simiyo/trivy
- https://github.com/t31m0/Vulnerability-Scanner-for-Containers
- https://github.com/umahari/security
- https://github.com/vshaliii/Basic-Pentesting-2-Vulnhub-Walkthrough
- https://github.com/vshaliii/DC-4-Vulnhub-Walkthrough
- https://github.com/vshaliii/Funbox2-rookie