CVE-2019-6111
MEDIUM EXPLOITED IN THE WILD RANSOMWAREOpenbsd Openssh < 7.9 - Path Traversal
Title source: ruleDescription
An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned (only directory traversal attacks are prevented). A malicious scp server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the scp client target directory. If recursive operation (-r) is performed, the server can manipulate subdirectories as well (for example, to overwrite the .ssh/authorized_keys file).
Exploits (4)
exploitdb
WORKING POC
by Mark E. Haase · pythonremotemultiple
https://www.exploit-db.com/exploits/46193
exploitdb
WORKING POC
by Harry Sintonen · pythonremotemultiple
https://www.exploit-db.com/exploits/46516
References (23)
... and 3 more
Scores
CVSS v3
5.9
EPSS
0.5497
EPSS Percentile
98.1%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
Details
VulnCheck KEV
2020-11-02
InTheWild.io
2022-05-25
Ransomware Use
Confirmed
CWE
CWE-22
Status
published
Products (32)
apache/mina_sshd
2.2.0
canonical/ubuntu_linux
14.04
canonical/ubuntu_linux
16.04
canonical/ubuntu_linux
18.04
canonical/ubuntu_linux
18.10
debian/debian_linux
8.0
debian/debian_linux
9.0
fedoraproject/fedora
30
freebsd/freebsd
12.0 (4 CPE variants)
freebsd/freebsd
< 12.0
... and 22 more
Published
Jan 31, 2019
Tracked Since
Feb 18, 2026