cve/2019/CVE-2019-6111.md

62 lines
3.2 KiB
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2019-6111](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6111)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
2025-09-29 21:09:30 +02:00
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brightgreen)
2024-05-26 14:27:05 +02:00
### Description
An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned (only directory traversal attacks are prevented). A malicious scp server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the scp client target directory. If recursive operation (-r) is performed, the server can manipulate subdirectories as well (for example, to overwrite the .ssh/authorized_keys file).
### POC
#### Reference
- https://bugzilla.redhat.com/show_bug.cgi?id=1677794
2025-09-29 21:09:30 +02:00
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
2024-05-26 14:27:05 +02:00
- https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt
- https://www.exploit-db.com/exploits/46193/
- https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
#### Github
- https://github.com/0xT11/CVE-POC
- https://github.com/53n7hu/SNP
2025-09-29 21:09:30 +02:00
- https://github.com/ARPSyndicate/cve-scores
2024-05-26 14:27:05 +02:00
- https://github.com/ARPSyndicate/cvemon
- https://github.com/AntonVanAssche/CSV-NPE2223
2025-09-29 21:09:30 +02:00
- https://github.com/ELHADANITAHA/OWASP-JSP-TP
2024-05-26 14:27:05 +02:00
- https://github.com/Fastiraz/openssh-cve-resolv
- https://github.com/InesMartins31/iot-cves
- https://github.com/KorayAgaya/TrivyWeb
2025-09-29 21:09:30 +02:00
- https://github.com/Maribel0370/Nebula-io
2024-05-26 14:27:05 +02:00
- https://github.com/Mohzeela/external-secret
2025-09-29 21:09:30 +02:00
- https://github.com/NeoOniX/5ATTACK
- https://github.com/Threadlinee/IP-Threat-Analyzer
2024-05-26 14:27:05 +02:00
- https://github.com/TommasoBilotta/public
2025-09-29 21:09:30 +02:00
- https://github.com/ZorvithonLeo/BiG7EXploits
- https://github.com/awslabs/Chatbot-to-help-security-teams-perform-vulnerability-assessments
2024-07-25 21:25:12 +00:00
- https://github.com/bigb0x/CVE-2024-6387
2024-08-25 17:33:10 +00:00
- https://github.com/bigb0x/OpenSSH-Scanner
2024-05-26 14:27:05 +02:00
- https://github.com/bioly230/THM_Skynet
- https://github.com/developer3000S/PoC-in-GitHub
2025-09-29 21:09:30 +02:00
- https://github.com/edsonjt81/https-github.com-gotr00t0day-OpenSSH-Scanner
2024-05-26 14:27:05 +02:00
- https://github.com/firatesatoglu/iot-searchengine
- https://github.com/firatesatoglu/shodanSearch
- https://github.com/h4xrOx/Direct-Admin-Vulnerability-Disclosure
2025-09-29 21:09:30 +02:00
- https://github.com/hackingyseguridad/ssha
2024-05-26 14:27:05 +02:00
- https://github.com/hectorgie/PoC-in-GitHub
2025-09-29 21:09:30 +02:00
- https://github.com/krlabs/openssh-vulnerabilities
- https://github.com/lekctut/sdb-hw-13-01
- https://github.com/mbadanoiu/MAL-008
2024-05-26 14:27:05 +02:00
- https://github.com/nomi-sec/PoC-in-GitHub
2025-09-29 21:09:30 +02:00
- https://github.com/pedr0alencar/vlab-metasploitable2
2024-05-26 14:27:05 +02:00
- https://github.com/retr0-13/cveScannerV2
2024-08-25 17:33:10 +00:00
- https://github.com/ryanalieh/openSSH-scanner
2024-05-26 14:27:05 +02:00
- https://github.com/scmanjarrez/CVEScannerV2
- https://github.com/siddharthraopotukuchi/trivy
- https://github.com/simiyo/trivy
- https://github.com/t31m0/Vulnerability-Scanner-for-Containers
- https://github.com/umahari/security
- https://github.com/vshaliii/Basic-Pentesting-2-Vulnhub-Walkthrough
- https://github.com/vshaliii/DC-4-Vulnhub-Walkthrough
- https://github.com/vshaliii/Funbox2-rookie