In ssh in OpenSSH before 9.6, OS command injection might occur if a user name or host name has shell metacharacters, and this name is referenced by an expansion token in certain situations. For example, an untrusted Git repository can have a submodule with shell metacharacters in a user name or host name.
[
{
"id": "CVE-2023-51385-0a0232ee",
"deprecated": false,
"signature_version": "v1",
"signature_type": "Function",
"digest": {
"function_hash": "70957496196284585050479216237541973508",
"length": 25589.0
},
"target": {
"file": "ssh.c",
"function": "main"
},
"source": "https://github.com/openssh/openssh-portable/commit/7ef3787c84b6b524501211b11a26c742f829af1a"
},
{
"id": "CVE-2023-51385-1f7f63ed",
"deprecated": false,
"signature_version": "v1",
"signature_type": "Line",
"digest": {
"line_hashes": [
"302129403808892202751107050716447255615",
"131931615182977091926508911644840089378",
"292141981209210395634936391072959491054",
"163768464370795856549232577824910300828",
"228255596276621902893441569339173223720",
"54970469869008711962314518569320120653",
"292412567841264930351270340709776136395"
],
"threshold": 0.9
},
"target": {
"file": "ssh.c"
},
"source": "https://github.com/openssh/openssh-portable/commit/7ef3787c84b6b524501211b11a26c742f829af1a"
}
]