Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS1qbXFwLTM3bTUtNDl3aM4AA8EQ

sshproxy vulnerable to SSH option injection

Impact

Any user authorized to connect to a ssh server using sshproxy can inject options to the ssh command executed by sshproxy.
All versions of sshproxy are impacted.

Patches

The problem is patched starting on version 1.6.3

Workarounds

The only workaround is to use the force_command option in sshproxy.yaml, but it's rarely relevant.

References

Permalink: https://github.com/advisories/GHSA-jmqp-37m5-49wh
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1qbXFwLTM3bTUtNDl3aM4AA8EQ
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Low
Classification: General
Published: 6 months ago
Updated: 5 months ago


CVSS Score: 3.5
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N

Identifiers: GHSA-jmqp-37m5-49wh, CVE-2024-34713
References: Repository: https://github.com/cea-hpc/sshproxy
Blast Radius: 1.0

Affected Packages

go:github.com/cea-hpc/sshproxy
Dependent packages: 0
Dependent repositories: 0
Downloads:
Affected Version Ranges: <= 1.6.2
Fixed in: 1.6.3
All affected versions: 0.1.0, 0.2.0, 0.3.0, 0.3.1, 0.4.0, 0.4.1, 0.4.2, 0.4.3, 0.4.4, 0.4.5, 1.0.0, 1.1.0, 1.2.0, 1.3.0, 1.3.1, 1.3.2, 1.3.3, 1.3.4, 1.3.5, 1.3.6, 1.3.7, 1.3.8, 1.4.0, 1.5.0, 1.5.1, 1.5.2, 1.6.0, 1.6.1, 1.6.2
All unaffected versions: 1.6.3