Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-51385

Опубликовано: 18 дек. 2023
Источник: redhat
CVSS3: 6.5
EPSS Низкий

Описание

In ssh in OpenSSH before 9.6, OS command injection might occur if a user name or host name has shell metacharacters, and this name is referenced by an expansion token in certain situations. For example, an untrusted Git repository can have a submodule with shell metacharacters in a user name or host name.

A flaw was found in OpenSSH. In certain circumstances, a remote attacker may be able to execute arbitrary OS commands by using expansion tokens, such as %u or %h, with user names or host names that contain shell metacharacters.

Отчет

The ability to execute OS commands is dependent on what quoting is present in the user-supplied ssh_config directive. However, it is generally the user's responsibility to validate arguments passed to SSH.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6opensshOut of support scope
Red Hat Enterprise Linux 7opensshOut of support scope
Red Hat Enterprise Linux 8opensshFixedRHSA-2024:060630.01.2024
Red Hat Enterprise Linux 8opensshFixedRHSA-2024:060630.01.2024
Red Hat Enterprise Linux 8.6 Extended Update SupportopensshFixedRHSA-2024:042925.01.2024
Red Hat Enterprise Linux 8.8 Extended Update SupportopensshFixedRHSA-2024:059430.01.2024
Red Hat Enterprise Linux 9opensshFixedRHSA-2024:113005.03.2024
Red Hat Enterprise Linux 9opensshFixedRHSA-2024:113005.03.2024
Red Hat Enterprise Linux 9.2 Extended Update SupportopensshFixedRHSA-2024:045525.01.2024
RHODF-4.15-RHEL-9odf4/cephcsi-rhel9FixedRHSA-2024:138319.03.2024

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-78
https://bugzilla.redhat.com/show_bug.cgi?id=2255271openssh: potential command injection via shell metacharacters

EPSS

Процентиль: 91%
0.06438
Низкий

6.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.5
ubuntu
больше 1 года назад

In ssh in OpenSSH before 9.6, OS command injection might occur if a user name or host name has shell metacharacters, and this name is referenced by an expansion token in certain situations. For example, an untrusted Git repository can have a submodule with shell metacharacters in a user name or host name.

CVSS3: 6.5
nvd
больше 1 года назад

In ssh in OpenSSH before 9.6, OS command injection might occur if a user name or host name has shell metacharacters, and this name is referenced by an expansion token in certain situations. For example, an untrusted Git repository can have a submodule with shell metacharacters in a user name or host name.

CVSS3: 6.5
msrc
больше 1 года назад

Описание отсутствует

CVSS3: 6.5
debian
больше 1 года назад

In ssh in OpenSSH before 9.6, OS command injection might occur if a us ...

suse-cvrf
больше 1 года назад

Security update for openssh

EPSS

Процентиль: 91%
0.06438
Низкий

6.5 Medium

CVSS3