Lucene search

K
githubGitHub Advisory DatabaseGHSA-6XF3-5HP7-XQQG
HistoryAug 25, 2022 - 12:00 a.m.

Improper token validation leading to code execution in Teleport

2022-08-2500:00:28
CWE-20
CWE-77
GitHub Advisory Database
github.com
17
teleport
command injection
remote code execution
url encoding
bash escape
carriage return line feed
social engineering
unauthenticated attack
trusted teleport server

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

EPSS

0.031

Percentile

91.2%

Teleport 9.3.6 is vulnerable to Command injection leading to Remote Code Execution. An attacker can craft a malicious ssh agent installation link by URL encoding a bash escape with carriage return line feed. This url encoded payload can be used in place of a token and sent to a user in a social engineering attack. This is fully unauthenticated attack utilizing the trusted teleport server to deliver the payload.

Affected configurations

Vulners
Node
gravitationalteleportRange10.0.010.1.2
OR
gravitationalteleportRange9.0.09.3.13
OR
gravitationalteleportRange<8.3.17
VendorProductVersionCPE
gravitationalteleport*cpe:2.3:a:gravitational:teleport:*:*:*:*:*:*:*:*

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

EPSS

0.031

Percentile

91.2%