First published: Wed Mar 06 2024(Updated: )
In ssh in OpenSSH before 9.6, OS command injection might occur if a user name or host name has shell metacharacters, and this name is referenced by an expansion token in certain situations. For example, an untrusted Git repository can have a submodule with shell metacharacters in a user name or host name.
Affected Software | Affected Version | How to fix |
---|---|---|
F5 BIG-IP Next | >=20.0.1<=20.3.0 | |
F5 BIG-IP Next Central Manager | >=20.0.1<=20.3.0 | |
F5 BIG-IP and BIG-IQ Centralized Management | >=17.1.0<=17.1.2 | |
F5 BIG-IP and BIG-IQ Centralized Management | >=16.1.0<=16.1.5 | |
F5 BIG-IP and BIG-IQ Centralized Management | >=15.1.0<=15.1.10 | |
F5 BIG-IP and BIG-IQ Centralized Management | >=8.1.0<=8.3.0 | |
F5 F5OS-A | =1.8.0=1.7.0>=1.5.0<=1.5.1=1.4.0>=1.3.0<=1.3.2 | |
F5 F5OS-C | >=1.6.0<=1.6.2>=1.5.0<=1.5.1 | |
F5 Traffix Systems Signaling Delivery Controller | =5.2.0=5.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of F5-K000138827 is classified as high due to the potential for OS command injection.
To mitigate F5-K000138827, update to the patched versions of affected software as specified by F5 advisories.
F5-K000138827 affects various products including F5 BIG-IP, BIG-IQ Centralized Management, and F5OS.
F5-K000138827 is an OS command injection vulnerability that occurs due to improper handling of user input.
F5-K000138827 was disclosed with versions of OpenSSH before 9.6 being vulnerable to the identified issue.