CVE-2019-14889

A flaw was found with the libssh API function ssh_scp_new() in versions before 0.9.3 and before 0.8.8. When the libssh SCP client connects to a server, the scp command, which includes a user-provided path, is executed on the server-side. In case the library is used in a way where users can influence the third parameter of the function, it would become possible for an attacker to inject arbitrary commands, leading to a compromise of the remote target.
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00033.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00047.html Mailing List Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14889 Issue Tracking Patch Third Party Advisory
https://lists.debian.org/debian-lts-announce/2019/12/msg00020.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2023/05/msg00029.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7JJWJTXVWLLJTVHBPGWL7472S5FWXYQR/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EV2ONSPDJCTDVORCB4UGRQUZQQ46JHRN/
https://security.gentoo.org/glsa/202003-27 Third Party Advisory
https://usn.ubuntu.com/4219-1/ Third Party Advisory
https://www.libssh.org/security/advisories/CVE-2019-14889.txt Vendor Advisory
https://www.oracle.com/security-alerts/cpuapr2020.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00033.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00047.html Mailing List Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14889 Issue Tracking Patch Third Party Advisory
https://lists.debian.org/debian-lts-announce/2019/12/msg00020.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2023/05/msg00029.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7JJWJTXVWLLJTVHBPGWL7472S5FWXYQR/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EV2ONSPDJCTDVORCB4UGRQUZQQ46JHRN/
https://security.gentoo.org/glsa/202003-27 Third Party Advisory
https://usn.ubuntu.com/4219-1/ Third Party Advisory
https://www.libssh.org/security/advisories/CVE-2019-14889.txt Vendor Advisory
https://www.oracle.com/security-alerts/cpuapr2020.html Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:libssh:libssh:*:*:*:*:*:*:*:*
cpe:2.3:a:libssh:libssh:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*

Configuration 5 (hide)

cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

Configuration 6 (hide)

cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2019-12-10 23:15

Updated : 2024-11-21 04:27


NVD link : CVE-2019-14889

Mitre link : CVE-2019-14889

CVE.ORG link : CVE-2019-14889


JSON object : View

Products Affected

debian

  • debian_linux

fedoraproject

  • fedora

libssh

  • libssh

oracle

  • mysql_workbench

opensuse

  • leap

canonical

  • ubuntu_linux
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')