CVE-2019-6111 -- openssh-serverID: oval:org.secpod.oval:def:1902003 | Date: (C)2019-06-07 (M)2023-12-20 |
Class: VULNERABILITY | Family: unix |
An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned . A malicious scp server can overwrite arbitrary files in the scp client target directory. If recursive operation is performed, the server can manipulate subdirectories as well .