CVE-2023-6004

medium

Description

A flaw was found in libssh. By utilizing the ProxyCommand or ProxyJump feature, users can exploit unchecked hostname syntax on the client. This issue may allow an attacker to inject malicious code into the command of the features mentioned through the hostname parameter.

References

https://www.libssh.org/security/advisories/CVE-2023-6004.txt

https://security.netapp.com/advisory/ntap-20240223-0004/

https://lists.fedoraproject.org/archives/list/[email protected]/message/LZQVUHWVWRH73YBXUQJOD6CKHDQBU3DM/

https://bugzilla.redhat.com/show_bug.cgi?id=2251110

https://access.redhat.com/security/cve/CVE-2023-6004

https://access.redhat.com/errata/RHSA-2024:3233

https://access.redhat.com/errata/RHSA-2024:2504

Details

Source: Mitre, NVD

Published: 2024-01-03

Updated: 2024-05-22

Risk Information

CVSS v2

Base Score: 4.3

Vector: CVSS2#AV:L/AC:L/Au:S/C:P/I:P/A:P

Severity: Medium

CVSS v3

Base Score: 4.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L

Severity: Medium