{"id":"CVE-2016-5725","details":"Directory traversal vulnerability in JCraft JSch before 0.1.54 on Windows, when the mode is ChannelSftp.OVERWRITE, allows remote SFTP servers to write to arbitrary files via a ..\\ (dot dot backslash) in a response to a recursive GET command.","aliases":["GHSA-q446-82vq-w674"],"modified":"2026-03-12T22:12:38.355184Z","published":"2017-01-19T22:59:00.150Z","related":["MGASA-2016-0311","SUSE-SU-2017:0715-1"],"references":[{"type":"WEB","url":"https://www.oracle.com/security-alerts/cpujan2021.html"},{"type":"WEB","url":"https://www.oracle.com/security-alerts/cpuoct2020.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2020/04/msg00017.html"},{"type":"WEB","url":"https://www.oracle.com/security-alerts/cpuApr2021.html"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:3115"},{"type":"ADVISORY","url":"https://github.com/tintinweb/pub/tree/master/pocs/cve-2016-5725"},{"type":"ADVISORY","url":"https://www.exploit-db.com/exploits/40411/"},{"type":"ADVISORY","url":"http://www.jcraft.com/jsch/ChangeLog"},{"type":"ADVISORY","url":"http://packetstormsecurity.com/files/138809/jsch-0.1.53-Path-Traversal.html"},{"type":"ADVISORY","url":"http://seclists.org/fulldisclosure/2016/Sep/53"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/93100"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-5725.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"0.1.53"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"}]}