{ "id": "CVE-2024-34713", "sourceIdentifier": "security-advisories@github.com", "published": "2024-05-14T16:17:27.147", "lastModified": "2024-05-14T19:17:55.627", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "sshproxy is used on a gateway to transparently proxy a user SSH connection on the gateway to an internal host via SSH. Prior to version 1.6.3, any user authorized to connect to a ssh server using `sshproxy` can inject options to the `ssh` command executed by `sshproxy`. All versions of `sshproxy` are impacted. The problem is patched starting in version 1.6.3. The only workaround is to use the `force_command` option in `sshproxy.yaml`, but it's rarely relevant." }, { "lang": "es", "value": "sshproxy se utiliza en una puerta de enlace para representar de forma transparente una conexi\u00f3n SSH de usuario en la puerta de enlace a un host interno a trav\u00e9s de SSH. Antes de la versi\u00f3n 1.6.3, cualquier usuario autorizado para conectarse a un servidor ssh usando `sshproxy` pod\u00eda inyectar opciones al comando `ssh` ejecutado por `sshproxy`. Todas las versiones de `sshproxy` se ven afectadas. El problema se solucion\u00f3 a partir de la versi\u00f3n 1.6.3. La \u00fanica soluci\u00f3n es utilizar la opci\u00f3n `force_command` en `sshproxy.yaml`, pero rara vez es relevante." } ], "metrics": { "cvssMetricV31": [ { "source": "security-advisories@github.com", "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW" }, "exploitabilityScore": 2.1, "impactScore": 1.4 } ] }, "weaknesses": [ { "source": "security-advisories@github.com", "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-77" } ] } ], "references": [ { "url": "https://github.com/cea-hpc/sshproxy/commit/f7eabd05d5f0f951e160293692327cad9a7d9580", "source": "security-advisories@github.com" }, { "url": "https://github.com/cea-hpc/sshproxy/security/advisories/GHSA-jmqp-37m5-49wh", "source": "security-advisories@github.com" } ] }