Bug ID 1160805: The scp-checkfp fail to cat scp.whitelist for remote admin

Last Modified: Apr 24, 2024

Affected Product(s):
BIG-IP TMOS(all modules)

Known Affected Versions:
15.1.8.2, 16.1.3.1, 16.1.3.2, 16.1.3.3, 16.1.3.4, 16.1.3.5, 17.1.0, 17.1.0.1, 17.1.0.2, 17.1.0.3, 17.1.1, 17.1.1.1, 17.1.1.2

Fixed In:
16.1.4, 15.1.9

Opened: Sep 22, 2022

Severity: 3-Major

Symptoms

Attempt SCP file to BIG-IP: /shared/images root user success remote admin user fails, following is an example: sinkhole3:~$ scp test.iso apiuser@10.201.69.106:/shared/images Password: cat: /co: No such file or directory cat: fig/ssh/scp.whitelist: No such file or directory "/shared/images/test.iso": path not allowed

Impact

SCP command is not working for the remote admin users.

Conditions

-- Running BIG-IP version with fix for ID 1097193. -- Create remote admin user. -- Use SCP command to transfer a file to remote admin user path.

Workaround

None

Fix Information

Issue is with the Internal Field Separation (IFS) environment variable from /bin/scp-checkfp file. Following is an example for IFS: IFS=$"\n" --> This means, it expects a string character. It should expect a character value to read the paths from the SCP files. IFS=$'\n' --> This means, it expects a character.

Behavior Change

Guides & references

K10134038: F5 Bug Tracker Filter Names and Tips