CVE-2018-20685

Published Jan 10, 2019

Last updated 24 days ago

Overview

Description
In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass intended access restrictions via the filename of . or an empty filename. The impact is modifying the permissions of the target directory on the client side.
Source
cve@mitre.org
NVD status
Modified
Products
openssh, winscp, cloud_backup, element_software, ontap_select_deploy, steelstore_cloud_integrated_storage, storage_automation_store, debian_linux, ubuntu_linux, enterprise_linux, enterprise_linux_eus, enterprise_linux_server_aus, enterprise_linux_server_tus, solaris, m10-1_firmware, m10-4_firmware, m10-4s_firmware, m12-1_firmware, m12-2_firmware, m12-2s_firmware, scalance_x204rna_firmware, scalance_x204rna_eec_firmware

Risk scores

CVSS 3.1

Type
Primary
Base score
5.3
Impact score
3.6
Exploitability score
1.6
Vector string
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N
Severity
MEDIUM

CVSS 2.0

Type
Primary
Base score
2.6
Impact score
2.9
Exploitability score
4.9
Vector string
AV:N/AC:H/Au:N/C:N/I:P/A:N

Weaknesses

nvd@nist.gov
CWE-863
134c704f-9b21-4f2e-91b3-4a467353bcc0
CWE-863

Social media

Hype score
Not currently trending

Configurations

References

Sources include official advisories and independent security research.