{ "data_type": "CVE", "data_format": "MITRE", "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2019-14889", "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "vendor_name": "Red Hat", "product": { "product_data": [ { "product_name": "libssh", "version": { "version_data": [ { "version_value": "All libssh versions before 0.9.3" }, { "version_value": "All libssh versions before 0.8.8" } ] } } ] } } ] } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-78" } ] } ] }, "references": { "reference_data": [ { "refsource": "UBUNTU", "name": "USN-4219-1", "url": "https://usn.ubuntu.com/4219-1/" }, { "refsource": "SUSE", "name": "openSUSE-SU-2019:2689", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00033.html" }, { "refsource": "MLIST", "name": "[debian-lts-announce] 20191217 [SECURITY] [DLA 2038-1] libssh security update", "url": "https://lists.debian.org/debian-lts-announce/2019/12/msg00020.html" }, { "refsource": "FEDORA", "name": "FEDORA-2019-8b0ad69829", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7JJWJTXVWLLJTVHBPGWL7472S5FWXYQR/" }, { "refsource": "FEDORA", "name": "FEDORA-2019-46b6bd2459", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EV2ONSPDJCTDVORCB4UGRQUZQQ46JHRN/" }, { "refsource": "SUSE", "name": "openSUSE-SU-2020:0102", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00047.html" }, { "refsource": "GENTOO", "name": "GLSA-202003-27", "url": "https://security.gentoo.org/glsa/202003-27" }, { "url": "https://www.oracle.com/security-alerts/cpuapr2020.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuapr2020.html" }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14889", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14889", "refsource": "CONFIRM" }, { "refsource": "CONFIRM", "name": "https://www.libssh.org/security/advisories/CVE-2019-14889.txt", "url": "https://www.libssh.org/security/advisories/CVE-2019-14889.txt" }, { "refsource": "MLIST", "name": "[debian-lts-announce] 20230529 [SECURITY] [DLA 3437-1] libssh security update", "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00029.html" } ] }, "description": { "description_data": [ { "lang": "eng", "value": "A flaw was found with the libssh API function ssh_scp_new() in versions before 0.9.3 and before 0.8.8. When the libssh SCP client connects to a server, the scp command, which includes a user-provided path, is executed on the server-side. In case the library is used in a way where users can influence the third parameter of the function, it would become possible for an attacker to inject arbitrary commands, leading to a compromise of the remote target." } ] }, "impact": { "cvss": [ [ { "vectorString": "7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } ] ] } }