Any user authorized to connect to a ssh server using sshproxy
can inject options to the ssh
command executed by sshproxy
.
All versions of sshproxy
are impacted.
The problem is patched starting on version 1.6.3
The only workaround is to use the force_command
option in sshproxy.yaml
, but it's rarely relevant.
{ "nvd_published_at": "2024-05-14T16:17:27Z", "cwe_ids": [ "CWE-77" ], "severity": "LOW", "github_reviewed": true, "github_reviewed_at": "2024-05-14T20:16:33Z" }