icon

We found results for “

CVE-2024-34713

Good to know:

icon

Date: May 14, 2024

sshproxy is used on a gateway to transparently proxy a user SSH connection on the gateway to an internal host via SSH. Prior to version 1.6.3, any user authorized to connect to a ssh server using "sshproxy" can inject options to the "ssh" command executed by "sshproxy". All versions of "sshproxy" are impacted. The problem is patched starting in version 1.6.3. The only workaround is to use the "force_command" option in "sshproxy.yaml", but it's rarely relevant.

Language: Go

Severity Score

Severity Score

Weakness Type (CWE)

Improper Neutralization of Special Elements used in a Command ('Command Injection')

CWE-77

Top Fix

icon

Upgrade Version

Upgrade to version github.com/cea-hpc/sshproxy - v1.6.3

Learn More

CVSS v3.1

Base Score:
Attack Vector (AV): NETWORK
Attack Complexity (AC): LOW
Privileges Required (PR): LOW
User Interaction (UI): REQUIRED
Scope (S): UNCHANGED
Confidentiality (C): LOW
Integrity (I): NONE
Availability (A): NONE

Do you need more information?

Contact Us