Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Severity
Medium
Category
Vulnerability
Analysis Summary
The vulnerability lies in the design of Secure Copy Protocol (SCP) tools and can be exploited by malicious servers to unexpectedly alter victims’ files on their client machines, in the context of the user running the affected application.
Exploitation of this vulnerability by a malicious SCP Server isn’t limited to alteration of the files which you fetched, but also expands to changing of access permissions, or downloading of extra documents. The SCP client fails to thoroughly check whether it’s getting the expected objects or not, which can be exploited by attackers to overwrite the user’s .bash_aliases file. This, in turn, would allow the attacker to run arbitrary commands on the victim’s device when they do routine stuff, like list a directory.
However, the scp client only performs cursory validation of the object name returned (only directory traversal attacks are prevented), while the server chooses which files/directories are sent to the client. If recursive operation (-r) is performed, the server can manipulate subdirectories as well (for example, to overwrite the .ssh/authorized_keys file).
OpenSSH 7.9 and prior versions are vulnerable. This issue affects the scp client shipped with openssh. The SSH protocol or the SSH client is not affected.
Impact
Changing of Access Permissions
Unauthorized File Downloads
Affected Products
OpenSSH 7.9 and prior
Remediation
Find a quick patch by sintonen in the link below: https://sintonen.fi/advisories/scp-name-validator.patch A vendor patch is still not available.