Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS1xNDQ2LTgydnEtdzY3NM3wYw

Improper Limitation of a Pathname to a Restricted Directory in JCraft JSch

Directory traversal vulnerability in JCraft JSch before 0.1.54 on Windows, when the mode is ChannelSftp.OVERWRITE, allows remote SFTP servers to write to arbitrary files via a ..\ (dot dot backslash) in a response to a recursive GET command.

Permalink: https://github.com/advisories/GHSA-q446-82vq-w674
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1xNDQ2LTgydnEtdzY3NM3wYw
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: about 2 years ago
Updated: over 1 year ago


CVSS Score: 5.9
CVSS vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N

Identifiers: GHSA-q446-82vq-w674, CVE-2016-5725
References: Repository: https://github.com/tintinweb/pub
Blast Radius: 25.0

Affected Packages

maven:com.jcraft:jsch
Dependent packages: 1,279
Dependent repositories: 17,304
Downloads:
Affected Version Ranges: <= 0.1.53
Fixed in: 0.1.54
All affected versions: 0.1.23, 0.1.24, 0.1.25, 0.1.27, 0.1.29, 0.1.31, 0.1.38, 0.1.41, 0.1.42, 0.1.43, 0.1.44, 0.1.45, 0.1.46, 0.1.47, 0.1.48, 0.1.49, 0.1.50, 0.1.51, 0.1.52, 0.1.53
All unaffected versions: 0.1.54, 0.1.55