First published: Mon Dec 18 2023(Updated: )
In ssh in OpenSSH before 9.6, OS command injection might occur if a user name or host name has shell metacharacters, and this name is referenced by an expansion token in certain situations. For example, an untrusted Git repository can have a submodule with shell metacharacters in a user name or host name.
Credit: cve@mitre.org cve@mitre.org CVE-2023-48795 CVE-2023-51384 CVE-2023-51385
Affected Software | Affected Version | How to fix |
---|---|---|
Openbsd Openssh | <9.6 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 | |
Debian Debian Linux | =12.0 | |
Apple macOS Sonoma | <14.4 | 14.4 |
IBM QRadar Network Packet Capture | <=7.5.0 - 7.5.0 Update Package 7 | |
debian/openssh | 1:8.4p1-5+deb11u3 1:9.2p1-2+deb12u3 1:9.9p1-3 | |
redhat/openssh | <9.6 | 9.6 |
F5 BIG-IP Next (LTM, WAF) | >=20.0.1<=20.3.0 | |
F5 BIG-IP Next Central Manager | >=20.0.1<=20.3.0 | |
F5 BIG-IP | >=17.1.0<=17.1.1 | |
F5 BIG-IP | >=16.1.0<=16.1.5 | |
F5 BIG-IP | >=15.1.0<=15.1.10 | |
F5 BIG-IQ Centralized Management | >=8.1.0<=8.3.0 | |
F5 F5OS-A | =1.8.0=1.7.0>=1.5.0<=1.5.1=1.4.0>=1.3.0<=1.3.2 | |
F5 F5OS-C | >=1.6.0<=1.6.2>=1.5.0<=1.5.1 | |
F5 Traffix SDC | =5.2.0=5.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)