ssh2 is client and server modules written in pure JavaScript for node.js. In ssh2 before version 1.4.0 there is a command injection vulnerability. The issue only exists on Windows. This issue may lead to remote code execution if a client of the library calls the vulnerable method with untrusted input. This is fixed in version 1.4.0. References: https://securitylab.github.com/advisories/GHSL-2020-123-mscdex-ssh2/ https://github.com/mscdex/ssh2/commit/f763271f41320e71d5cbee02ea5bc6a2ded3ca21 https://www.npmjs.com/package/ssh2
This issue has been addressed in the following products: Red Hat OpenShift Container Storage 4.8.0 on RHEL-8 Via RHSA-2021:4845 https://access.redhat.com/errata/RHSA-2021:4845
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2020-26301