Bug 2251110 (CVE-2023-6004)
| Summary: | CVE-2023-6004 libssh: ProxyCommand/ProxyJump features allow injection of malicious code through hostname | ||
|---|---|---|---|
| Product: | [Other] Security Response | Reporter: | Anten Skrabec <askrabec> |
| Component: | vulnerability | Assignee: | Product Security <prodsec-ir-bot> |
| Status: | NEW --- | QA Contact: | |
| Severity: | low | Docs Contact: | |
| Priority: | low | ||
| Version: | unspecified | CC: | jjelen, security-response-team |
| Target Milestone: | --- | Keywords: | Security |
| Target Release: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | libssh 0.9.8, libssh 0.10.6 | Doc Type: | If docs needed, set a value |
| Doc Text: |
A flaw was found in libssh. By utilizing the ProxyCommand or ProxyJump feature, users can exploit unchecked hostname syntax on the client. This issue may allow an attacker to inject malicious code into the command of the features mentioned through the hostname parameter.
|
Story Points: | --- |
| Clone Of: | Environment: | ||
| Last Closed: | Type: | --- | |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
| Bug Depends On: | 2255152 | ||
| Bug Blocks: | 2251111 | ||
|
Description
Anten Skrabec
2023-11-22 23:23:13 UTC
Created libssh tracking bugs for this issue: Affects: fedora-all [bug 2255152] This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2024:2504 https://access.redhat.com/errata/RHSA-2024:2504 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2024:3233 https://access.redhat.com/errata/RHSA-2024:3233 |