Lucene search

K
nvd[email protected]NVD:CVE-2023-51385
HistoryDec 18, 2023 - 7:15 p.m.

CVE-2023-51385

2023-12-1819:15:08
CWE-78
web.nvd.nist.gov
2
cve-2023-51385
ssh
os command injection
openssh
user name
host name
shell metacharacters
expansion token
git repository
submodule

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N

0.003 Low

EPSS

Percentile

67.9%

In ssh in OpenSSH before 9.6, OS command injection might occur if a user name or host name has shell metacharacters, and this name is referenced by an expansion token in certain situations. For example, an untrusted Git repository can have a submodule with shell metacharacters in a user name or host name.

Affected configurations

NVD
Node
openbsdopensshRange<9.6
Node
debiandebian_linuxMatch10.0
OR
debiandebian_linuxMatch11.0
OR
debiandebian_linuxMatch12.0

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N

0.003 Low

EPSS

Percentile

67.9%