2024-12-08 03:06:42 +00:00

126 lines
3.9 KiB
JSON

{
"id": "CVE-2022-36633",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-08-24T13:15:08.130",
"lastModified": "2024-11-21T07:13:25.977",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Teleport 9.3.6 is vulnerable to Command injection leading to Remote Code Execution. An attacker can craft a malicious ssh agent installation link by URL encoding a bash escape with carriage return line feed. This url encoded payload can be used in place of a token and sent to a user in a social engineering attack. This is fully unauthenticated attack utilizing the trusted teleport server to deliver the payload."
},
{
"lang": "es",
"value": "Teleport versi\u00f3n 9.3.6 es vulnerable a una inyecci\u00f3n de comandos conllevando a una ejecuci\u00f3n de c\u00f3digo remota. Un atacante puede dise\u00f1ar un enlace malicioso de instalaci\u00f3n del agente ssh mediante la codificaci\u00f3n de la URL de un escape bash con retorno de l\u00ednea. Esta carga \u00fatil codificada en la URL puede usarse en lugar de un token y enviarse a un usuario en un ataque de ingenier\u00eda social. Este es un ataque totalmente no autenticado que usa el servidor de teleportaci\u00f3n confiable para entregar la carga \u00fatil."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:goteleport:teleport:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.1.2",
"matchCriteriaId": "86FDF161-AB68-4FF8-B3C0-5FD1268BBB4C"
}
]
}
]
}
],
"references": [
{
"url": "http://packetstormsecurity.com/files/168477/Teleport-10.1.1-Remote-Code-Execution.html",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://github.com/gravitational/teleport",
"source": "cve@mitre.org",
"tags": [
"Product",
"Third Party Advisory"
]
},
{
"url": "https://packetstormsecurity.com/files/168137/Teleport-9.3.6-Command-Injection.html",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://packetstormsecurity.com/files/168477/Teleport-10.1.1-Remote-Code-Execution.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://github.com/gravitational/teleport",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product",
"Third Party Advisory"
]
},
{
"url": "https://packetstormsecurity.com/files/168137/Teleport-9.3.6-Command-Injection.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
}
]
}