4.8
CVSSv3

CVE-2023-6004

Published: 03/01/2024 Updated: 23/02/2024
CVSS v3 Base Score: 4.8 | Impact Score: 3.4 | Exploitability Score: 1.3
VMScore: 0

Vulnerability Summary

A flaw was found in libssh. By utilizing the ProxyCommand or ProxyJump feature, users can exploit unchecked hostname syntax on the client. This issue may allow an malicious user to inject malicious code into the command of the features mentioned through the hostname parameter.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

libssh libssh

redhat enterprise linux 8.0

redhat enterprise linux 9.0

fedoraproject fedora 38

Vendor Advisories

Debian Bug report logs - #1059061 libssh: CVE-2023-6004 Package: src:libssh; Maintainer for src:libssh is Laurent Bigonville <bigon@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Tue, 19 Dec 2023 21:39:04 UTC Severity: important Tags: security, upstream Found in version libssh/0105-3 ...
Description<!----> This CVE is under investigation by Red Hat Product Security ...

Mailing Lists

<!--X-Body-Begin--> <!--X-User-Header--> oss-sec mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> CVE-2023-51385, CVE-2023-6004: OpenSSH, libssh: Security weakness in ProxyCommand handling <!--X-Subject-Header-End--> <!--X-H ...