Bugzilla – Bug 997542
VUL-0: CVE-2016-5725: jsch: recursive sftp get client-side windows path traversal
Last modified: 2017-03-17 11:09:02 UTC
CVE-2016-5725 A malicious sftp server may force a client-side relative path traversal in jsch's implementation for recursive sftp-get allowing the server to write files outside the clients download basedir with effective permissions of the jsch sftp client process. * affects recursive get, i.e. sftp :/* . * post-auth * file overwrite capability depends on the client specified mode: * ChannelSftp.get(...,mode==ChannelSftp.OVERWRITE) * windows only References: https://github.com/tintinweb/pub/tree/master/pocs/cve-2016-5725 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-5725 http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-5725.html
It is windows only. Linux platform isn't affected.
JCSH is a Java applet. But it uses \ paths for this traversal, which only works on windows.
SUSE-SU-2017:0715-1: An update that fixes one vulnerability is now available. Category: security (moderate) Bug References: 997542 CVE References: CVE-2016-5725 Sources used: SUSE Manager Server 3.0 (src): jsch-0.1.54-3.1