First published: Wed Sep 14 2016(Updated: )
JSch could allow a remote attacker to traverse directories on the system. An attacker could send a specially-crafted URL request to the implementation for recursive sftp-get containing "dot dot" sequences (/../) to download the malicious files outside the client download base directory.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
JCraft JSch | <=0.1.53 | |
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-5725 is considered a medium severity vulnerability as it allows directory traversal leading to unauthorized file access.
To fix CVE-2016-5725, update JSch to a version later than 0.1.53 where the vulnerability has been addressed.
CVE-2016-5725 can be exploited by attackers to download sensitive files from outside the intended directory using crafted SFTP requests.
All versions of JSch up to and including 0.1.53 are affected by CVE-2016-5725.
No, CVE-2016-5725 affects the JCraft JSch library and is not limited to any specific operating system.