This is a summary of the AI-generated 10-question deep analysis. The full version (longer answers, follow-up Q&A, related CVEs) requires login. Read the full analysis β
Q1What is this vulnerability? (Essence + Consequences)
π¨ **Essence**: A Path Traversal flaw in Wish SCP middleware. π **Consequences**: Attackers can read/write **arbitrary files** and create directories outside the allowed root.β¦
π‘οΈ **Root Cause**: **CWE-22** (Path Traversal). The SCP middleware fails to sanitize input. It allows `../` sequences to escape the designated directory boundary. π« No proper validation of file paths.
Q3Who is affected? (Versions/Components)
π― **Affected**: **charmbracelet/wish**. Specifically versions **2.0.0** up to (but not including) **2.0.1**. π¦ Any server using this specific SCP middleware configuration is at risk.
Q4What can hackers do? (Privileges/Data)
π **Capabilities**: π **Read**: Access sensitive server files. βοΈ **Write**: Inject malicious files. π **Create**: Make directories outside the chroot/root. β οΈ High impact on Confidentiality & Integrity.
Q5Is exploitation threshold high? (Auth/Config)
π **Threshold**: **Medium**. Requires **PR:L** (Low Privileges). You need valid SSH credentials to connect. πΆ Not remote unauthenticated, but easy for any valid user to exploit.
Q6Is there a public Exp? (PoC/Wild Exploitation)
π§ͺ **Exploit Status**: No public PoC listed in data. π΅οΈ However, path traversal is a standard technique. Wild exploitation is likely if attackers know the target uses Wish SCP. πΈοΈ
Q7How to self-check? (Features/Scanning)
π **Self-Check**: 1. Check Wish version (`< 2.0.1`). 2. Scan for SCP service on SSH port. 3. Test if `../` in filenames escapes the root dir. π§ͺ Use standard path traversal payloads.
π§ **No Patch?**: Disable SCP middleware if not needed. π« Restrict user permissions. π Implement strict path validation at the application level. Isolate the service.
Q10Is it urgent? (Priority Suggestion)
π₯ **Urgency**: **HIGH**. CVSS Score indicates High Impact. π Published May 2026. Update to v2.0.1 ASAP to prevent arbitrary file access. Don't wait!