Lucene search

K
cve[email protected]CVE-2023-51385
HistoryDec 18, 2023 - 7:15 p.m.

CVE-2023-51385

2023-12-1819:15:08
CWE-78
web.nvd.nist.gov
525
27
cve-2023-51385
openssh
os command injection
shell metacharacters
exploitation
nvd

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N

7.1 High

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

67.8%

In ssh in OpenSSH before 9.6, OS command injection might occur if a user name or host name has shell metacharacters, and this name is referenced by an expansion token in certain situations. For example, an untrusted Git repository can have a submodule with shell metacharacters in a user name or host name.

Affected configurations

NVD
Node
openbsdopensshRange<9.6
Node
debiandebian_linuxMatch10.0
OR
debiandebian_linuxMatch11.0
OR
debiandebian_linuxMatch12.0
CPENameOperatorVersion
openbsd:opensshopenbsd opensshlt9.6

Social References

More

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N

7.1 High

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

67.8%