CVE-2023-6004

A flaw was found in libssh. By utilizing the ProxyCommand or ProxyJump feature, users can exploit unchecked hostname syntax on the client. This issue may allow an attacker to inject malicious code into the command of the features mentioned through the hostname parameter.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:libssh:libssh:*:*:*:*:*:*:*:*
cpe:2.3:a:libssh:libssh:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2024-01-03 17:15

Updated : 2024-05-22 17:16


NVD link : CVE-2023-6004

Mitre link : CVE-2023-6004

CVE.ORG link : CVE-2023-6004


JSON object : View

Products Affected

redhat

  • enterprise_linux

fedoraproject

  • fedora

libssh

  • libssh
CWE
CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')