Command Injection using malicious hostname in expanded proxycommand
Team Summary
Official summary from Internet Bug Bounty
Subject: Security weakness in ProxyCommand handling CVE ID#: CVE-2023-6004 Versions: 0.10.x, 0.9.x, 0.8.x Summary: ProxyCommand/ProxyJump features enable to inject malicious code through hostname Description Using the ProxyCommand or the ProxyJump feature enables users to exploit unchecked hostname syntax on the client, which enables to inject malicious code into the command of the above-mentioned features through the hostname parameter. User interaction is required to exploit this issue. Credits Originally reported by Vinci (https:// github.com/vin01). Patches provided by Norbert Pocs of the libssh team. Full Security Advisory: https://www.libssh.org/security/advisories/CVE-2023-6004.txt
Vulnerability Details
Technical details and impact analysis
Related CVEs
Associated Common Vulnerabilities and Exposures
A flaw was found in libssh. By utilizing the ProxyCommand or ProxyJump feature, users can exploit unchecked hostname syntax on the client. This issue may allow an attacker to inject malicious code into the command of the features mentioned through the hostname parameter.
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Bounty
$540.00
Submitted
Weakness
Code Injection