CVE-2023-6004

A flaw was found in libssh. By utilizing the ProxyCommand or ProxyJump feature, users can exploit unchecked hostname syntax on the client. This issue may allow an attacker to inject malicious code into the command of the features mentioned through the hostname parameter.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:libssh:libssh:*:*:*:*:*:*:*:*
cpe:2.3:a:libssh:libssh:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*

History

21 Nov 2024, 08:42

Type Values Removed Values Added
References
  • () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LZQVUHWVWRH73YBXUQJOD6CKHDQBU3DM/ -
  • () https://security.netapp.com/advisory/ntap-20240223-0004/ -
References () https://access.redhat.com/errata/RHSA-2024:2504 - () https://access.redhat.com/errata/RHSA-2024:2504 -
References () https://access.redhat.com/errata/RHSA-2024:3233 - () https://access.redhat.com/errata/RHSA-2024:3233 -
References () https://access.redhat.com/security/cve/CVE-2023-6004 - Vendor Advisory () https://access.redhat.com/security/cve/CVE-2023-6004 - Vendor Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=2251110 - Issue Tracking () https://bugzilla.redhat.com/show_bug.cgi?id=2251110 - Issue Tracking
References () https://www.libssh.org/security/advisories/CVE-2023-6004.txt - Mailing List () https://www.libssh.org/security/advisories/CVE-2023-6004.txt - Mailing List

16 Sep 2024, 18:15

Type Values Removed Values Added
References
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LZQVUHWVWRH73YBXUQJOD6CKHDQBU3DM/', 'tags': ['Mailing List', 'Vendor Advisory'], 'source': 'secalert@redhat.com'}
  • {'url': 'https://security.netapp.com/advisory/ntap-20240223-0004/', 'source': 'secalert@redhat.com'}

22 May 2024, 17:16

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2024:3233 -

30 Apr 2024, 15:15

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2024:2504 -

23 Feb 2024, 16:15

Type Values Removed Values Added
References
  • () https://security.netapp.com/advisory/ntap-20240223-0004/ -

25 Jan 2024, 12:15

Type Values Removed Values Added
References () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LZQVUHWVWRH73YBXUQJOD6CKHDQBU3DM/ - Vendor Advisory () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LZQVUHWVWRH73YBXUQJOD6CKHDQBU3DM/ - Mailing List, Vendor Advisory
CVSS v2 : unknown
v3 : 7.8
v2 : unknown
v3 : 4.8

11 Jan 2024, 19:18

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 3.9
v2 : unknown
v3 : 7.8
CPE cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:a:libssh:libssh:*:*:*:*:*:*:*:*
First Time Libssh
Libssh libssh
Fedoraproject fedora
Redhat enterprise Linux
Redhat
Fedoraproject
References () https://access.redhat.com/security/cve/CVE-2023-6004 - () https://access.redhat.com/security/cve/CVE-2023-6004 - Vendor Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=2251110 - () https://bugzilla.redhat.com/show_bug.cgi?id=2251110 - Issue Tracking
References () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LZQVUHWVWRH73YBXUQJOD6CKHDQBU3DM/ - () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LZQVUHWVWRH73YBXUQJOD6CKHDQBU3DM/ - Vendor Advisory
References () https://www.libssh.org/security/advisories/CVE-2023-6004.txt - () https://www.libssh.org/security/advisories/CVE-2023-6004.txt - Mailing List

10 Jan 2024, 03:15

Type Values Removed Values Added
Summary
  • (es) Se encontró una falla en libssh. Al utilizar la función ProxyCommand o ProxyJump, los usuarios pueden explotar la sintaxis del hostname no verificada en el cliente. Este problema puede permitir que un atacante inyecte código malicioso en el comando de las funciones mencionadas a través del parámetro de hostname.
References
  • () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LZQVUHWVWRH73YBXUQJOD6CKHDQBU3DM/ -

03 Jan 2024, 17:26

Type Values Removed Values Added
New CVE

Information

Published : 2024-01-03 17:15

Updated : 2024-11-21 08:42


NVD link : CVE-2023-6004

Mitre link : CVE-2023-6004

CVE.ORG link : CVE-2023-6004


JSON object : View

Products Affected

libssh

  • libssh

redhat

  • enterprise_linux

fedoraproject

  • fedora
CWE
CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')