PT-2020-6183 · Openssh +2 · Openssh +2
Published
2020-06-01
·
Updated
2024-08-04
·
CVE-2020-12062
7.8
High
Base vector | Vector | AV:N/AC:L/Au:N/C:N/I:C/A:N |
Name of the Vulnerable Software and Affected Versions:
OpenSSH version 8.2
Description:
The issue arises from the scp client in OpenSSH incorrectly sending duplicate responses to the server upon a utimes system call failure. This allows a malicious unprivileged user on the remote server to overwrite arbitrary files in the client's download directory by creating a crafted subdirectory anywhere on the remote server. The victim must use the command scp -rp to download a file hierarchy containing, anywhere inside, this crafted subdirectory. It is noted that this attack can achieve no more than a hostile peer is already able to achieve within the scp protocol and utimes does not fail under normal circumstances.
Recommendations:
As a temporary workaround, consider restricting the use of the scp -rp command until a patch is available.
Avoid using the scp client to download file hierarchies from untrusted sources.
Restrict access to the download directory to minimize the risk of exploitation.
At the moment, there is no information about a newer version that contains a fix for this vulnerability.
Exploit
RCE
Weakness Enumeration
Related Identifiers
Affected Products
References · 348
- 🔥 https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/ssh/ssh_enumusers.rb⭐ 35561 🔗 14312 · Exploit
- 🔥 https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/ssh/ssh_version.rb⭐ 34895 🔗 14176 · Exploit
- 🔥 https://github.com/Rhynorater/CVE-2018-15473-Exploit⭐ 523 🔗 184 · Exploit
- 🔥 https://github.com/zgzhang/cve-2024-6387-poc⭐ 477 🔗 185 · Exploit
- 🔥 https://github.com/xaitax/CVE-2024-6387_Check⭐ 497 🔗 95 · Exploit
- 🔥 https://github.com/acrono/cve-2024-6387-poc⭐ 380 🔗 89 · Exploit
- 🔥 https://github.com/cpandya2909/CVE-2020-15778⭐ 141 🔗 26 · Exploit
- 🔥 https://github.com/lflare/cve-2024-6387-poc⭐ 122 🔗 42 · Exploit
- 🔥 https://github.com/asterictnl-lvdw/CVE-2024-6387⭐ 128 🔗 34 · Exploit
- 🔥 https://github.com/epi052/cve-2018-15473⭐ 108 🔗 30 · Exploit
- 🔥 https://github.com/KINGSABRI/CVE-in-Ruby/tree/master/CVE-2016-6210⭐ 80 🔗 49 · Exploit
- 🔥 https://github.com/Christbowel/CVE-2023-25136⭐ 105 🔗 22 · Exploit
- 🔥 https://github.com/l0n3m4n/CVE-2024-6387⭐ 88 🔗 30 · Exploit
- 🔥 https://github.com/filipi86/CVE-2024-6387-Vulnerability-Checker⭐ 97 🔗 16 · Exploit
- 🔥 https://github.com/opsxcq/exploit-CVE-2016-6515⭐ 53 🔗 30 · Exploit