5.9
MEDIUM CVSS 3.1
CVE-2019-25017
MIT Kerberos rcp Remote File Write Vulnerability
Description

An issue was discovered in rcp in MIT krb5-appl through 1.0.3. Due to the rcp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the rcp client only performs cursory validation of the object name returned (only directory traversal attacks are prevented). A malicious rcp server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the rcp client target directory. If recursive operation (-r) is performed, the server can manipulate subdirectories as well (for example, to overwrite the .ssh/authorized_keys file). This issue is similar to CVE-2019-6111 and CVE-2019-7283. NOTE: MIT krb5-appl is not supported upstream but is shipped by a few Linux distributions. The affected code was removed from the supported MIT Kerberos 5 (aka krb5) product many years ago, at version 1.8.

INFO

Published Date :

Feb. 2, 2021, 6:15 p.m.

Last Modified :

Nov. 21, 2024, 4:39 a.m.

Remotely Exploit :

Yes !
Affected Products

The following products are affected by CVE-2019-25017 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Mit krb5-appl
CVSS Scores
The Common Vulnerability Scoring System is a standardized framework for assessing the severity of vulnerabilities in software and systems. We collect and displays CVSS scores from various sources for each CVE.
Score Version Severity Vector Exploitability Score Impact Score Source
CVSS 2.0 MEDIUM [email protected]
CVSS 3.1 MEDIUM [email protected]
Solution
This information is provided by the 3rd party feeds.
  • To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or 'zypper patch'. Alternatively you can run the command listed for your product : SUSE OpenStack Cloud Crowbar 9 : zypper in -t patch SUSE-OpenStack-Cloud-Crowbar-9-2021-527=1 SUSE OpenStack Cloud Crowbar 8 : zypper in -t patch SUSE-OpenStack-Cloud-Crowbar-8-2021-527=1 SUSE OpenStack Cloud 9 : zypper in -t patch SUSE-OpenStack-Cloud-9-2021-527=1 SUSE OpenStack Cloud 8 : zypper in -t patch SUSE-OpenStack-Cloud-8-2021-527=1 SUSE OpenStack Cloud 7 : zypper in -t patch SUSE-OpenStack-Cloud-7-2021-527=1 SUSE Linux Enterprise Server for SAP 12-SP4 : zypper in -t patch SUSE-SLE-SAP-12-SP4-2021-527=1 SUSE Linux Enterprise Server for SAP 12-SP3 : zypper in -t patch SUSE-SLE-SAP-12-SP3-2021-527=1 SUSE Linux Enterprise Server for SAP 12-SP2 : zypper in -t patch SUSE-SLE-SAP-12-SP2-2021-527=1 SUSE Linux Enterprise Server 12-SP5 : zypper in -t patch SUSE-SLE-SERVER-12-SP5-2021-527=1 SUSE Linux Enterprise Server 12-SP4-LTSS : zypper in -t patch SUSE-SLE-SERVER-12-SP4-LTSS-2021-527=1 SUSE Linux Enterprise Server 12-SP3-LTSS : zypper in -t patch SUSE-SLE-SERVER-12-SP3-2021-527=1 SUSE Linux Enterprise Server 12-SP3-BCL : zypper in -t patch SUSE-SLE-SERVER-12-SP3-BCL-2021-527=1 SUSE Linux Enterprise Server 12-SP2-LTSS : zypper in -t patch SUSE-SLE-SERVER-12-SP2-2021-527=1 SUSE Linux Enterprise Server 12-SP2-BCL : zypper in -t patch SUSE-SLE-SERVER-12-SP2-BCL-2021-527=1 HPE Helion Openstack 8 : zypper in -t patch HPE-Helion-OpenStack-8-2021-527=1
Public PoC/Exploit Available at Github

CVE-2019-25017 has a 2 public PoC/Exploit available at Github. Go to the Public Exploits tab to see the list.

References to Advisories, Solutions, and Tools

Here, you will find a curated list of external links that provide in-depth information, practical solutions, and valuable tools related to CVE-2019-25017.

URL Resource
https://bugzilla.suse.com/show_bug.cgi?id=1131109 Exploit Issue Tracking Third Party Advisory
https://bugzilla.suse.com/show_bug.cgi?id=1131109 Exploit Issue Tracking Third Party Advisory
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2019-25017 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2019-25017 weaknesses.

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

None

Updated: 4 years, 1 month ago
1 stars 0 fork 0 watcher
Born at : July 12, 2021, 4:20 a.m. This repo has been linked 15 different CVEs too.

This is a boot2root VM and is a continuation of the Basic Pentesting series. This series is designed to help newcomers to penetration testing develop pentesting skills and have fun exploring part of the offensive side of security. VirtualBox is the recommended platform for this challenge (though it should also work with VMware -- however, I haven’t tested that). This VM is a moderate step up in difficulty from the first entry in this series. If you’ve solved the first entry and have tried a few other beginner-oriented challenges, this VM should be a good next step. Once again, this challenge contains multiple initial exploitation vectors and privilege escalation vulnerabilities. Your goal is to remotely attack the VM, gain root privileges, and read the flag located at /root/flag.txt. Once you’ve finished, try to find other vectors you might have missed! If you’d like to send me a link to your writeup, enjoyed the VM or have questions or feedback, feel free to contact me at: [email protected] If you finished the VM, please also consider posting a writeup! Writeups help you internalize what you worked on and help anyone else who might be struggling or wants to see someone else’s process. There were lots of wonderful writeups for Basic Pentesting: 1, and I look forward to reading the writeups for this challenge.

Updated: 2 years, 1 month ago
5 stars 5 fork 5 watcher
Born at : May 25, 2021, 9:07 a.m. This repo has been linked 78 different CVEs too.

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2019-25017 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2019-25017 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    Nov. 21, 2024

    Action Type Old Value New Value
    Added Reference https://bugzilla.suse.com/show_bug.cgi?id=1131109
  • CVE Modified by [email protected]

    May. 14, 2024

    Action Type Old Value New Value
  • CWE Remap by [email protected]

    Jul. 21, 2021

    Action Type Old Value New Value
    Changed CWE NVD-CWE-noinfo CWE-863
  • Initial Analysis by [email protected]

    Feb. 05, 2021

    Action Type Old Value New Value
    Added CVSS V2 NIST (AV:N/AC:M/Au:N/C:N/I:P/A:P)
    Added CVSS V3.1 NIST AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
    Changed Reference Type https://bugzilla.suse.com/show_bug.cgi?id=1131109 No Types Assigned https://bugzilla.suse.com/show_bug.cgi?id=1131109 Exploit, Issue Tracking, Third Party Advisory
    Added CWE NIST NVD-CWE-noinfo
    Added CPE Configuration OR *cpe:2.3:a:mit:krb5-appl:*:*:*:*:*:*:*:* versions up to (including) 1.0.3
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
Vulnerability Scoring Details
Base CVSS Score: 5.9
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact
Base CVSS Score: 5.8
Access Vector
Access Complexity
Authentication
Confidentiality Impact
Integrity Impact
Availability Impact
Exploit Prediction

EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days.

0.38 }} 0.09%

score

0.58539

percentile