Headline
GHSA-jmqp-37m5-49wh: sshproxy vulnerable to SSH option injection
Impact
Any user authorized to connect to a ssh server using sshproxy
can inject options to the ssh
command executed by sshproxy
.
All versions of sshproxy
are impacted.
Patches
The problem is patched starting on version 1.6.3
Workarounds
The only workaround is to use the force_command
option in sshproxy.yaml
, but it’s rarely relevant.
References
Package
gomod github.com/cea-hpc/sshproxy (Go)
Affected versions
<= 1.6.2
Patched versions
1.6.3
Description
Impact
Any user authorized to connect to a ssh server using sshproxy can inject options to the ssh command executed by sshproxy.
All versions of sshproxy are impacted.
Patches
The problem is patched starting on version 1.6.3
Workarounds
The only workaround is to use the force_command option in sshproxy.yaml, but it’s rarely relevant.
References****References
- GHSA-jmqp-37m5-49wh
- https://nvd.nist.gov/vuln/detail/CVE-2024-34713
- cea-hpc/sshproxy@3b8bccc
- cea-hpc/sshproxy@f7eabd0
cyrilst published to cea-hpc/sshproxy
May 14, 2024
Published by the National Vulnerability Database
May 14, 2024
Published to the GitHub Advisory Database
May 14, 2024
Reviewed
May 14, 2024
Last updated
May 14, 2024