Vulnerability Details : CVE-2023-6004
A flaw was found in libssh. By utilizing the ProxyCommand or ProxyJump feature, users can exploit unchecked hostname syntax on the client. This issue may allow an attacker to inject malicious code into the command of the features mentioned through the hostname parameter.
Products affected by CVE-2023-6004
- cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*
- cpe:2.3:a:libssh:libssh:*:*:*:*:*:*:*:*
- cpe:2.3:a:libssh:libssh:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-6004
0.05%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 12 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-6004
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.8
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
NIST | 2024-01-11 |
4.8
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L |
1.3
|
3.4
|
NIST | 2024-01-16 |
6.1
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H |
1.3
|
4.7
|
Red Hat, Inc. | 2024-01-16 |
4.8
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L |
1.3
|
3.4
|
Red Hat, Inc. | 2024-01-25 |
3.9
|
LOW | CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N |
1.3
|
2.5
|
Red Hat, Inc. | 2024-01-03 |
3.9
|
LOW | CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N |
N/A
|
N/A
|
RedHat-CVE-2023-6004 |
CWE ids for CVE-2023-6004
-
The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.Assigned by:
- nvd@nist.gov (Primary)
- secalert@redhat.com (Secondary)
References for CVE-2023-6004
-
https://security.netapp.com/advisory/ntap-20240223-0004/
CVE-2023-6004 libssh Vulnerability in NetApp Products | NetApp Product Security
-
https://access.redhat.com/security/cve/CVE-2023-6004
CVE-2023-6004- Red Hat Customer PortalVendor Advisory
-
https://access.redhat.com/errata/RHSA-2024:2504
RHSA-2024:2504 - Security Advisory - Red Hat 客户门户网站
-
https://bugzilla.redhat.com/show_bug.cgi?id=2251110
2251110 – (CVE-2023-6004) CVE-2023-6004 libssh: ProxyCommand/ProxyJump features allow injection of malicious code through hostnameIssue Tracking
-
https://access.redhat.com/errata/RHSA-2024:3233
RHSA-2024:3233 - Security Advisory - Red Hat Customer Portal
-
https://www.libssh.org/security/advisories/CVE-2023-6004.txt
Mailing List
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LZQVUHWVWRH73YBXUQJOD6CKHDQBU3DM/
[SECURITY] Fedora 38 Update: libssh-0.10.6-2.fc38 - package-announce - Fedora Mailing-ListsMailing List;Vendor Advisory
Jump to