2024-05-26 14:27:05 +02:00
### [CVE-2018-20685](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20685)



### Description
In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass intended access restrictions via the filename of . or an empty filename. The impact is modifying the permissions of the target directory on the client side.
### POC
#### Reference
- https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt
2024-06-09 00:33:16 +00:00
- https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt
2024-05-26 14:27:05 +02:00
- https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
2024-06-09 00:33:16 +00:00
- https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
2024-05-26 14:27:05 +02:00
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Fastiraz/openssh-cve-resolv
- https://github.com/KorayAgaya/TrivyWeb
- https://github.com/Mohzeela/external-secret
- https://github.com/bioly230/THM_Skynet
- https://github.com/firatesatoglu/shodanSearch
- https://github.com/h4xrOx/Direct-Admin-Vulnerability-Disclosure
- https://github.com/siddharthraopotukuchi/trivy
- https://github.com/simiyo/trivy
- https://github.com/t31m0/Vulnerability-Scanner-for-Containers
- https://github.com/umahari/security
- https://github.com/vshaliii/Basic-Pentesting-2-Vulnhub-Walkthrough
- https://github.com/vshaliii/DC-4-Vulnhub-Walkthrough
- https://github.com/vshaliii/Funbox2-rookie