CVE-2019-6111

MEDIUM EXPLOITED IN THE WILD RANSOMWARE

Openbsd Openssh < 7.9 - Path Traversal

Title source: rule

Description

An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned (only directory traversal attacks are prevented). A malicious scp server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the scp client target directory. If recursive operation (-r) is performed, the server can manipulate subdirectories as well (for example, to overwrite the .ssh/authorized_keys file).

Exploits (4)

exploitdb WORKING POC
by Mark E. Haase · pythonremotemultiple
https://www.exploit-db.com/exploits/46193
exploitdb WORKING POC
by Harry Sintonen · pythonremotemultiple
https://www.exploit-db.com/exploits/46516
nomisec NO CODE 4 stars
by 53n7hu · poc
https://github.com/53n7hu/SNP
nomisec WRITEUP
by mbadanoiu · poc
https://github.com/mbadanoiu/MAL-008

References (23)

... and 3 more

Scores

CVSS v3 5.9
EPSS 0.5497
EPSS Percentile 98.1%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N

Details

VulnCheck KEV 2020-11-02
InTheWild.io 2022-05-25
Ransomware Use Confirmed
CWE
CWE-22
Status published
Products (32)
apache/mina_sshd 2.2.0
canonical/ubuntu_linux 14.04
canonical/ubuntu_linux 16.04
canonical/ubuntu_linux 18.04
canonical/ubuntu_linux 18.10
debian/debian_linux 8.0
debian/debian_linux 9.0
fedoraproject/fedora 30
freebsd/freebsd 12.0 (4 CPE variants)
freebsd/freebsd < 12.0
... and 22 more
Published Jan 31, 2019
Tracked Since Feb 18, 2026