Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-51385

Опубликовано: 18 дек. 2023
Источник: redhat
CVSS3: 6.5

Описание

In ssh in OpenSSH before 9.6, OS command injection might occur if a user name or host name has shell metacharacters, and this name is referenced by an expansion token in certain situations. For example, an untrusted Git repository can have a submodule with shell metacharacters in a user name or host name.

A flaw was found in OpenSSH. In certain circumstances, a remote attacker may be able to execute arbitrary OS commands by using expansion tokens, such as %u or %h, with user names or host names that contain shell metacharacters.

Отчет

The ability to execute OS commands is dependent on what quoting is present in the user-supplied ssh_config directive. However, it is generally the user's responsibility to validate arguments passed to SSH.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6opensshOut of support scope
Red Hat Enterprise Linux 7opensshOut of support scope
Red Hat Enterprise Linux 8opensshFixedRHSA-2024:060630.01.2024
Red Hat Enterprise Linux 8opensshFixedRHSA-2024:060630.01.2024
Red Hat Enterprise Linux 8.6 Extended Update SupportopensshFixedRHSA-2024:042925.01.2024
Red Hat Enterprise Linux 8.8 Extended Update SupportopensshFixedRHSA-2024:059430.01.2024
Red Hat Enterprise Linux 9opensshFixedRHSA-2024:113005.03.2024
Red Hat Enterprise Linux 9opensshFixedRHSA-2024:113005.03.2024
Red Hat Enterprise Linux 9.0 Update Services for SAP SolutionsopensshFixedRHSA-2026:179003.02.2026
Red Hat Enterprise Linux 9.2 Extended Update SupportopensshFixedRHSA-2024:045525.01.2024

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-78
https://bugzilla.redhat.com/show_bug.cgi?id=2255271openssh: potential command injection via shell metacharacters

6.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.5
ubuntu
больше 2 лет назад

In ssh in OpenSSH before 9.6, OS command injection might occur if a user name or host name has shell metacharacters, and this name is referenced by an expansion token in certain situations. For example, an untrusted Git repository can have a submodule with shell metacharacters in a user name or host name.

CVSS3: 6.5
nvd
больше 2 лет назад

In ssh in OpenSSH before 9.6, OS command injection might occur if a user name or host name has shell metacharacters, and this name is referenced by an expansion token in certain situations. For example, an untrusted Git repository can have a submodule with shell metacharacters in a user name or host name.

CVSS3: 6.5
msrc
больше 2 лет назад

Описание отсутствует

CVSS3: 6.5
debian
больше 2 лет назад

In ssh in OpenSSH before 9.6, OS command injection might occur if a us ...

suse-cvrf
около 2 лет назад

Security update for openssh

6.5 Medium

CVSS3