Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-jmqp-37m5-49wh: sshproxy vulnerable to SSH option injection

Impact

Any user authorized to connect to a ssh server using sshproxy can inject options to the ssh command executed by sshproxy. All versions of sshproxy are impacted.

Patches

The problem is patched starting on version 1.6.3

Workarounds

The only workaround is to use the force_command option in sshproxy.yaml, but it’s rarely relevant.

References

ghsa
#vulnerability#git#auth#ssh

Package

gomod github.com/cea-hpc/sshproxy (Go)

Affected versions

<= 1.6.2

Patched versions

1.6.3

Description

Impact

Any user authorized to connect to a ssh server using sshproxy can inject options to the ssh command executed by sshproxy.
All versions of sshproxy are impacted.

Patches

The problem is patched starting on version 1.6.3

Workarounds

The only workaround is to use the force_command option in sshproxy.yaml, but it’s rarely relevant.

References****References

  • GHSA-jmqp-37m5-49wh
  • https://nvd.nist.gov/vuln/detail/CVE-2024-34713
  • cea-hpc/sshproxy@3b8bccc
  • cea-hpc/sshproxy@f7eabd0

cyrilst published to cea-hpc/sshproxy

May 14, 2024

Published by the National Vulnerability Database

May 14, 2024

Published to the GitHub Advisory Database

May 14, 2024

Reviewed

May 14, 2024

Last updated

May 14, 2024

ghsa: Latest News

GHSA-27wf-5967-98gx: Kubernetes kubelet arbitrary command execution