Lucene search

K
ibmIBM926CD83AAB7DA7EA60F3ED2C60C4D2004D06E2189562B75111B63EE52FE070C2
HistoryMar 29, 2021 - 9:04 p.m.

Security Bulletin: Directory traversal vulnerability in JCraft JSch before 0.1.54 on Windows, when the mode is ChannelSftp.OVERWRITE

2021-03-2921:04:31
www.ibm.com
87

0.008 Low

EPSS

Percentile

82.1%

Summary

Directory traversal vulnerability in JCraft JSch before 0.1.54 on Windows, when the mode is ChannelSftp.OVERWRITE, allows remote SFTP servers to write to arbitrary files via a …\ (dot dot backslash) in a response to a recursive GET command.

Vulnerability Details

CVEID:CVE-2016-5725
**DESCRIPTION:**JSch could allow a remote attacker to traverse directories on the system. An attacker could send a specially-crafted URL request to the implementation for recursive sftp-get containing “dot dot” sequences (/…/) to download the malicious files outside the client download base directory.
CVSS Base score: 4.3
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/117122 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N)

Affected Products and Versions

Affected Product(s) Version(s)
UCD - IBM UrbanCode Deploy 6.2.7.4
UCD - IBM UrbanCode Deploy 6.2.7.3
UCD - IBM UrbanCode Deploy 7.0.4.0
UCD - IBM UrbanCode Deploy 7.0.3.0
UCD - IBM UrbanCode Deploy All

Remediation/Fixes

Update to z/OS Utility plugin version 54

Workarounds and Mitigations

None

CPENameOperatorVersion
ibm urbancode deployeq7.1.0.1

0.008 Low

EPSS

Percentile

82.1%