Directory traversal vulnerability in JCraft JSch before 0.1.54 on Windows, when the mode is ChannelSftp.OVERWRITE, allows remote SFTP servers to write to arbitrary files via a …\ (dot dot backslash) in a response to a recursive GET command.
CVEID:CVE-2016-5725
**DESCRIPTION:**JSch could allow a remote attacker to traverse directories on the system. An attacker could send a specially-crafted URL request to the implementation for recursive sftp-get containing “dot dot” sequences (/…/) to download the malicious files outside the client download base directory.
CVSS Base score: 4.3
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/117122 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N)
Affected Product(s) | Version(s) |
---|---|
UCD - IBM UrbanCode Deploy | 6.2.7.4 |
UCD - IBM UrbanCode Deploy | 6.2.7.3 |
UCD - IBM UrbanCode Deploy | 7.0.4.0 |
UCD - IBM UrbanCode Deploy | 7.0.3.0 |
UCD - IBM UrbanCode Deploy | All |
Update to z/OS Utility plugin version 54
None
CPE | Name | Operator | Version |
---|---|---|---|
ibm urbancode deploy | eq | 7.1.0.1 |