An issue was discovered in Midnight Commander through 4.8.26. When establishing an SFTP connection, the fingerprint of the server is neither checked nor displayed. As a result, a user connects to the server without the ability to verify its authenticity.
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Link | Tags |
---|---|
https://github.com/MidnightCommander/mc/blob/master/src/vfs/sftpfs/connection.c | third party advisory exploit |
https://github.com/MidnightCommander/mc/blob/5c1d3c55dd15356ec7d079084d904b7b0fd58d3e/src/vfs/sftpfs/connection.c#L484 | third party advisory exploit |
https://sourceforge.net/projects/mcwin32/files/ | third party advisory product |
https://midnight-commander.org/ | vendor advisory |
https://docs.ssh-mitm.at/CVE-2021-36370.html | third party advisory exploit |
https://mail.gnome.org/archives/mc-devel/2021-August/msg00008.html | third party advisory release notes |