Using the ProxyCommand or the ProxyJump feature enables users to exploit unchecked hostname syntax on the client, which enables to inject malicious code into the command of the above-mentioned features through the hostname parameter. User interaction is required to exploit this issue.
Created libssh tracking bugs for this issue: Affects: fedora-all [bug 2255152]
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2024:2504 https://access.redhat.com/errata/RHSA-2024:2504