Логотип exploitDog
bind:CVE-2024-34713
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-34713

Количество 2

Количество 2

nvd логотип

CVE-2024-34713

больше 1 года назад

sshproxy is used on a gateway to transparently proxy a user SSH connection on the gateway to an internal host via SSH. Prior to version 1.6.3, any user authorized to connect to a ssh server using `sshproxy` can inject options to the `ssh` command executed by `sshproxy`. All versions of `sshproxy` are impacted. The problem is patched starting in version 1.6.3. The only workaround is to use the `force_command` option in `sshproxy.yaml`, but it's rarely relevant.

CVSS3: 3.5
EPSS: Низкий
github логотип

GHSA-jmqp-37m5-49wh

больше 1 года назад

sshproxy vulnerable to SSH option injection

CVSS3: 3.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-34713

sshproxy is used on a gateway to transparently proxy a user SSH connection on the gateway to an internal host via SSH. Prior to version 1.6.3, any user authorized to connect to a ssh server using `sshproxy` can inject options to the `ssh` command executed by `sshproxy`. All versions of `sshproxy` are impacted. The problem is patched starting in version 1.6.3. The only workaround is to use the `force_command` option in `sshproxy.yaml`, but it's rarely relevant.

CVSS3: 3.5
0%
Низкий
больше 1 года назад
github логотип
GHSA-jmqp-37m5-49wh

sshproxy vulnerable to SSH option injection

CVSS3: 3.5
0%
Низкий
больше 1 года назад

Уязвимостей на страницу