Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1xNDQ2LTgydnEtdzY3NM3wYw
Improper Limitation of a Pathname to a Restricted Directory in JCraft JSch
Directory traversal vulnerability in JCraft JSch before 0.1.54 on Windows, when the mode is ChannelSftp.OVERWRITE, allows remote SFTP servers to write to arbitrary files via a ..\ (dot dot backslash) in a response to a recursive GET command.
Permalink: https://github.com/advisories/GHSA-q446-82vq-w674JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1xNDQ2LTgydnEtdzY3NM3wYw
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: about 2 years ago
Updated: over 1 year ago
CVSS Score: 5.9
CVSS vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
Identifiers: GHSA-q446-82vq-w674, CVE-2016-5725
References:
- https://nvd.nist.gov/vuln/detail/CVE-2016-5725
- https://access.redhat.com/errata/RHSA-2017:3115
- https://github.com/tintinweb/pub/tree/master/pocs/cve-2016-5725
- https://lists.debian.org/debian-lts-announce/2020/04/msg00017.html
- https://www.exploit-db.com/exploits/40411/
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- http://packetstormsecurity.com/files/138809/jsch-0.1.53-Path-Traversal.html
- http://seclists.org/fulldisclosure/2016/Sep/53
- http://www.jcraft.com/jsch/ChangeLog
- https://github.com/advisories/GHSA-q446-82vq-w674
Blast Radius: 25.0
Affected Packages
maven:com.jcraft:jsch
Dependent packages: 1,279Dependent repositories: 17,304
Downloads:
Affected Version Ranges: <= 0.1.53
Fixed in: 0.1.54
All affected versions: 0.1.23, 0.1.24, 0.1.25, 0.1.27, 0.1.29, 0.1.31, 0.1.38, 0.1.41, 0.1.42, 0.1.43, 0.1.44, 0.1.45, 0.1.46, 0.1.47, 0.1.48, 0.1.49, 0.1.50, 0.1.51, 0.1.52, 0.1.53
All unaffected versions: 0.1.54, 0.1.55