Entreprise d'experts en Sécurité Informatique : Audits et conseils en cybersécurité
Entreprise française de cybersécurité depuis 2004
☎ 03 60 47 09 81 - info@securiteinfo.com


CVE-2019-6111

Description

An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned (only directory traversal attacks are prevented). A malicious scp server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the scp client target directory. If recursive operation (-r) is performed, the server can manipulate subdirectories as well (for example, to overwrite the .ssh/authorized_keys file).

POC

Reference

- https://bugzilla.redhat.com/show_bug.cgi?id=1677794

- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf

- https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt

- https://www.exploit-db.com/exploits/46193/

- https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html

Github

- https://github.com/0xT11/CVE-POC

- https://github.com/53n7hu/SNP

- https://github.com/ARPSyndicate/cve-scores

- https://github.com/ARPSyndicate/cvemon

- https://github.com/AntonVanAssche/CSV-NPE2223

- https://github.com/ELHADANITAHA/OWASP-JSP-TP

- https://github.com/Fastiraz/openssh-cve-resolv

- https://github.com/InesMartins31/iot-cves

- https://github.com/KorayAgaya/TrivyWeb

- https://github.com/Maribel0370/Nebula-io

- https://github.com/Mohzeela/external-secret

- https://github.com/NeoOniX/5ATTACK

- https://github.com/Threadlinee/IP-Threat-Analyzer

- https://github.com/TommasoBilotta/public

- https://github.com/ZorvithonLeo/BiG7EXploits

- https://github.com/awslabs/Chatbot-to-help-security-teams-perform-vulnerability-assessments

- https://github.com/bigb0x/CVE-2024-6387

- https://github.com/bigb0x/OpenSSH-Scanner

- https://github.com/bioly230/THM_Skynet

- https://github.com/developer3000S/PoC-in-GitHub

- https://github.com/edsonjt81/https-github.com-gotr00t0day-OpenSSH-Scanner

- https://github.com/firatesatoglu/iot-searchengine

- https://github.com/firatesatoglu/shodanSearch

- https://github.com/h4xrOx/Direct-Admin-Vulnerability-Disclosure

- https://github.com/hackingyseguridad/ssha

- https://github.com/hectorgie/PoC-in-GitHub

- https://github.com/krlabs/openssh-vulnerabilities

- https://github.com/lekctut/sdb-hw-13-01

- https://github.com/mbadanoiu/MAL-008

- https://github.com/nomi-sec/PoC-in-GitHub

- https://github.com/pedr0alencar/vlab-metasploitable2

- https://github.com/retr0-13/cveScannerV2

- https://github.com/ryanalieh/openSSH-scanner

- https://github.com/scmanjarrez/CVEScannerV2

- https://github.com/siddharthraopotukuchi/trivy

- https://github.com/simiyo/trivy

- https://github.com/t31m0/Vulnerability-Scanner-for-Containers

- https://github.com/umahari/security

- https://github.com/vshaliii/Basic-Pentesting-2-Vulnhub-Walkthrough

- https://github.com/vshaliii/DC-4-Vulnhub-Walkthrough

- https://github.com/vshaliii/Funbox2-rookie