First published: Wed Mar 06 2024(Updated: )
In ssh in OpenSSH before 9.6, OS command injection might occur if a user name or host name has shell metacharacters, and this name is referenced by an expansion token in certain situations. For example, an untrusted Git repository can have a submodule with shell metacharacters in a user name or host name.
Affected Software | Affected Version | How to fix |
---|---|---|
F5 BIG-IP Next (LTM, WAF) | >=20.0.1<=20.3.0 | |
F5 BIG-IP Next Central Manager | >=20.0.1<=20.3.0 | |
F5 BIG-IP | >=17.1.0<=17.1.1 | |
F5 BIG-IP | >=16.1.0<=16.1.5 | |
F5 BIG-IP | >=15.1.0<=15.1.10 | |
F5 BIG-IQ Centralized Management | >=8.1.0<=8.3.0 | |
F5 F5OS-A | =1.8.0=1.7.0>=1.5.0<=1.5.1=1.4.0>=1.3.0<=1.3.2 | |
F5 F5OS-C | >=1.6.0<=1.6.2>=1.5.0<=1.5.1 | |
F5 Traffix SDC | =5.2.0=5.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.