5.9
CVSSv3

CVE-2016-5725

Published: 19/01/2017 Updated: 14/06/2021
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 5.9 | Impact Score: 3.6 | Exploitability Score: 2.2
VMScore: 435
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

Directory traversal vulnerability in JCraft JSch prior to 0.1.54 on Windows, when the mode is ChannelSftp.OVERWRITE, allows remote SFTP servers to write to arbitrary files via a ..\ (dot dot backslash) in a response to a recursive GET command.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

jcraft jsch

Vendor Advisories

Synopsis Moderate: Red Hat JBoss Fuse/A-MQ 63 R5 security and bug fix update Type/Severity Security Advisory: Moderate Topic An update is now available for Red Hat JBoss Fuse and Red Hat JBoss A-MQRed Hat Product Security has rated this update as having a security impact of Moderate A Common Vulnerabilit ...
A vulnerability was discovered in JSch that allows a malicious sftp server to force a client-side relative path traversal in jsch's implementation for recursive sftp-get An attacker could leverage this to write files outside the client's download basedir with effective permissions of the jsch sftp client process ...

Exploits

Ref: githubcom/tintinweb/pub/tree/master/pocs/cve-2016-5725 Version: 03 Date: Aug 31st, 2016 Complete Proof of Concept: githubcom/tintinweb/pub/tree/master/pocs/cve-2016-5725 githubcom/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40411zip Tag: jsch recursive sftp get client-si ...