Lucene search

K
openvasCopyright (C) 2023 Greenbone AGOPENVAS:1361412562310104869
HistoryJul 20, 2023 - 12:00 a.m.

OpenBSD OpenSSH < 9.3p2 RCE Vulnerability

2023-07-2000:00:00
Copyright (C) 2023 Greenbone AG
plugins.openvas.org
37
openbsd
openssh
vulnerability
remote code execution
rce
forwarded ssh-agent
specific libraries
update
9.3p2

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.9

Confidence

High

EPSS

0.058

Percentile

93.5%

OpenBSD OpenSSH is prone to a remote code execution (RCE)
vulnerability in OpenSSH

# SPDX-FileCopyrightText: 2023 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

CPE = "cpe:/a:openbsd:openssh";

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.104869");
  script_version("2023-10-13T05:06:10+0000");
  script_tag(name:"last_modification", value:"2023-10-13 05:06:10 +0000 (Fri, 13 Oct 2023)");
  script_tag(name:"creation_date", value:"2023-07-20 09:29:09 +0000 (Thu, 20 Jul 2023)");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:C/I:C/A:C");
  script_tag(name:"severity_vector", value:"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
  script_tag(name:"severity_origin", value:"NVD");
  script_tag(name:"severity_date", value:"2023-07-31 17:07:00 +0000 (Mon, 31 Jul 2023)");

  script_cve_id("CVE-2023-38408");

  script_tag(name:"qod_type", value:"remote_banner_unreliable");

  script_tag(name:"solution_type", value:"VendorFix");

  script_name("OpenBSD OpenSSH < 9.3p2 RCE Vulnerability");

  script_category(ACT_GATHER_INFO);

  script_copyright("Copyright (C) 2023 Greenbone AG");
  script_family("General");
  script_dependencies("gb_openssh_consolidation.nasl");
  script_mandatory_keys("openssh/detected");

  script_tag(name:"summary", value:"OpenBSD OpenSSH is prone to a remote code execution (RCE)
  vulnerability in OpenSSH's forwarded ssh-agent.");

  script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");

  script_tag(name:"insight", value:"A condition where specific libraries loaded via ssh-agent(1)'s
  PKCS#11 support could be abused to achieve remote code execution via a forwarded agent socket.");

  script_tag(name:"affected", value:"OpenBSD OpenSSH prior to version 9.3p2.

  The following conditions needs to be met:

  - Exploitation requires the presence of specific libraries on the victim system.

  - Remote exploitation requires that the agent was forwarded to an attacker-controlled system.");

  script_tag(name:"solution", value:"Update to version 9.3p2 or later.");

  script_xref(name:"URL", value:"https://www.openssh.com/releasenotes.html#9.3p2");
  script_xref(name:"URL", value:"https://www.qualys.com/2023/07/19/cve-2023-38408/rce-openssh-forwarded-ssh-agent.txt");

  exit(0);
}
include("version_func.inc");
include("host_details.inc");

if (isnull(port = get_app_port(cpe: CPE)))
  exit(0);

if (!infos = get_app_version_and_location(cpe: CPE, port: port, exit_no_version: TRUE))
  exit(0);

version = infos["version"];
location = infos["location"];

if (version_is_less(version: version, test_version: "9.3p2")) {
  report = report_fixed_ver(installed_version: version, fixed_version: "9.3p2", install_path: location);
  security_message(port: port, data: report);
  exit(0);
}

exit(99);

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.9

Confidence

High

EPSS

0.058

Percentile

93.5%