mc is vulnerable to privilege escalation. The vulnerability exists due to the lack of sanitization of the fingerprint of the server when establishing an SFTP connection.
CPE | Name | Operator | Version |
---|---|---|---|
mc:sid | eq | 3:4.8.25-1 | |
mc:sid | eq | 3:4.8.26-1 | |
mc:sid | eq | 3:4.8.25-1 | |
mc:sid | eq | 3:4.8.26-1 |
docs.ssh-mitm.at/CVE-2021-36370.html
github.com/MidnightCommander/mc/blob/5c1d3c55dd15356ec7d079084d904b7b0fd58d3e/src/vfs/sftpfs/connection.c#L484
github.com/MidnightCommander/mc/blob/master/src/vfs/sftpfs/connection.c
mail.gnome.org/archives/mc-devel/2021-August/msg00008.html
midnight-commander.org/
security-tracker.debian.org/tracker/CVE-2021-36370
sourceforge.net/projects/mcwin32/files/