Lucene search

K
osvGoogleOSV:GHSA-JMQP-37M5-49WH
HistoryMay 14, 2024 - 8:16 p.m.

sshproxy vulnerable to SSH option injection

2024-05-1420:16:33
Google
osv.dev
5
sshproxy
ssh command injection
vulnerability
patches
workaround
force command option

4.1 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

8.7%

Impact

Any user authorized to connect to a ssh server using sshproxy can inject options to the ssh command executed by sshproxy.
All versions of sshproxy are impacted.

Patches

The problem is patched starting on version 1.6.3

Workarounds

The only workaround is to use the force_command option in sshproxy.yaml, but it’s rarely relevant.

References

CPENameOperatorVersion
github.com/cea-hpc/sshproxylt1.6.3

4.1 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

8.7%

Related for OSV:GHSA-JMQP-37M5-49WH