libssh libssh CVE-2019-14889 vulnerability in Libssh and Other Products
Published on December 10, 2019

product logo product logo product logo product logo product logo product logo
A flaw was found with the libssh API function ssh_scp_new() in versions before 0.9.3 and before 0.8.8. When the libssh SCP client connects to a server, the scp command, which includes a user-provided path, is executed on the server-side. In case the library is used in a way where users can influence the third parameter of the function, it would become possible for an attacker to inject arbitrary commands, leading to a compromise of the remote target.

Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory NVD

Weakness Type

What is a Shell injection Vulnerability?

The software constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.

CVE-2019-14889 has been classified to as a Shell injection vulnerability or weakness.


Products Associated with CVE-2019-14889

You can be notified by email with stack.watch whenever vulnerabilities like CVE-2019-14889 are published in these products:

 
 
 
 
 
 

Affected Versions

Red Hat libssh:

Exploit Probability

EPSS
1.23%
Percentile
78.92%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.