Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-jmqp-37m5-49wh

Опубликовано: 14 мая 2024
Источник: github
Github: Прошло ревью
CVSS3: 3.5

Описание

sshproxy vulnerable to SSH option injection

Impact

Any user authorized to connect to a ssh server using sshproxy can inject options to the ssh command executed by sshproxy. All versions of sshproxy are impacted.

Patches

The problem is patched starting on version 1.6.3

Workarounds

The only workaround is to use the force_command option in sshproxy.yaml, but it's rarely relevant.

References

Пакеты

Наименование

github.com/cea-hpc/sshproxy

go
Затронутые версииВерсия исправления

<= 1.6.2

1.6.3

EPSS

Процентиль: 50%
0.0027
Низкий

3.5 Low

CVSS3

Дефекты

CWE-77

Связанные уязвимости

CVSS3: 3.5
nvd
больше 1 года назад

sshproxy is used on a gateway to transparently proxy a user SSH connection on the gateway to an internal host via SSH. Prior to version 1.6.3, any user authorized to connect to a ssh server using `sshproxy` can inject options to the `ssh` command executed by `sshproxy`. All versions of `sshproxy` are impacted. The problem is patched starting in version 1.6.3. The only workaround is to use the `force_command` option in `sshproxy.yaml`, but it's rarely relevant.

EPSS

Процентиль: 50%
0.0027
Низкий

3.5 Low

CVSS3

Дефекты

CWE-77