[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249982

 
 

909

 
 

195748

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2023-6004Date: (C)2024-01-04   (M)2024-05-07


A flaw was found in libssh. By utilizing the ProxyCommand or ProxyJump feature, users can exploit unchecked hostname syntax on the client. This issue may allow an attacker to inject malicious code into the command of the features mentioned through the hostname parameter.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : 4.8CVSS Score :
Exploit Score: 1.3Exploit Score:
Impact Score: 3.4Impact Score:
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: LOCALAccess Vector:
Attack Complexity: LOWAccess Complexity:
Privileges Required: LOWAuthentication:
User Interaction: REQUIREDConfidentiality:
Scope: UNCHANGEDIntegrity:
Confidentiality: LOWAvailability:
Integrity: LOW 
Availability: LOW 
  
Reference:
RHBZ#2251110
RHSA-2024:2504
https://access.redhat.com/security/cve/CVE-2023-6004
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LZQVUHWVWRH73YBXUQJOD6CKHDQBU3DM/
https://security.netapp.com/advisory/ntap-20240223-0004/
https://www.libssh.org/security/advisories/CVE-2023-6004.txt

CWE    1
CWE-74
OVAL    9
oval:org.secpod.oval:def:708712
oval:org.secpod.oval:def:98669
oval:org.secpod.oval:def:89051484
oval:org.secpod.oval:def:89051386
...

© SecPod Technologies