CVE-2023-51385
Summary
| CVE | CVE-2023-51385 |
|---|---|
| State | PUBLISHED |
| Assigner | mitre |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2023-12-18 19:15:08 UTC |
| Updated | 2026-05-12 12:16:15 UTC |
| Description | In ssh in OpenSSH before 9.6, OS command injection might occur if a user name or host name has shell metacharacters, and this name is referenced by an expansion token in certain situations. For example, an untrusted Git repository can have a submodule with shell metacharacters in a user name or host name. |
Risk And Classification
Primary CVSS: v3.1 6.5 MEDIUM from [email protected]
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
Problem Types: CWE-78 | n/a | CWE-78 CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
| Version | Source | Type | Score | Severity | Vector |
|---|---|---|---|---|---|
| 3.1 | [email protected] | Primary | 6.5 | MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N |
| 3.1 | ADP | DECLARED | 6.5 | MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N |
| 3.1 | 134c704f-9b21-4f2e-91b3-4a467353bcc0 | Secondary | 6.5 | MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N |
CVSS v3.1 Breakdown
Attack Vector
NetworkAttack Complexity
LowPrivileges Required
NoneUser Interaction
NoneScope
UnchangedConfidentiality
LowIntegrity
LowAvailability
NoneCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Debian | Debian Linux | 10.0 | All | All | All |
| Operating System | Debian | Debian Linux | 11.0 | All | All | All |
| Operating System | Debian | Debian Linux | 12.0 | All | All | All |
| Application | Openbsd | Openssh | All | All | All | All |
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|---|---|---|---|
| CNA | Na | N/a | affected n/a | Not specified |
| ADP | Siemens | SIMATIC S7-1500 CPU 1518-4 PN/DP MFP | affected V3.1.5 * custom | Not specified |
| ADP | Siemens | SIMATIC S7-1500 CPU 1518-4 PN/DP MFP | affected V3.1.5 * custom | Not specified |
| ADP | Siemens | SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP | affected V3.1.5 * custom | Not specified |
| ADP | Siemens | SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP | affected V3.1.5 * custom | Not specified |
| ADP | Siemens | SIPLUS S7-1500 CPU 1518-4 PN/DP MFP | affected V3.1.5 * custom | Not specified |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| www.openwall.com/lists/oss-security/2025/10/07/1 | af854a3a-2127-422b-91ae-364da2661108 | www.openwall.com | |
| security.netapp.com/advisory/ntap-20240105-0005 | af854a3a-2127-422b-91ae-364da2661108 | security.netapp.com | |
| seclists.org/fulldisclosure/2024/Mar/21 | af854a3a-2127-422b-91ae-364da2661108 | seclists.org | |
| Debian -- Security Information -- DSA-5586-1 openssh | af854a3a-2127-422b-91ae-364da2661108 | www.debian.org | Third Party Advisory |
| cert-portal.siemens.com/productcert/html/ssa-082556.html | 0b142b55-0307-4c5a-b3c9-f314f3fb7c5e | cert-portal.siemens.com | |
| www.openwall.com/lists/oss-security/2023/12/18/2 | af854a3a-2127-422b-91ae-364da2661108 | www.openwall.com | Mailing List, Release Notes |
| [SECURITY] [DLA 3694-1] openssh security update | af854a3a-2127-422b-91ae-364da2661108 | lists.debian.org | Mailing List, Third Party Advisory |
| cert-portal.siemens.com/productcert/html/ssa-769027.html | 0b142b55-0307-4c5a-b3c9-f314f3fb7c5e | cert-portal.siemens.com | |
| github.com/openssh/openssh-portable/commit/7ef3787c84b6b524501211b11a26c... | af854a3a-2127-422b-91ae-364da2661108 | github.com | Patch |
| security.gentoo.org/glsa/202312-17 | af854a3a-2127-422b-91ae-364da2661108 | security.gentoo.org | Third Party Advisory |
| cert-portal.siemens.com/productcert/html/ssa-794697.html | 0b142b55-0307-4c5a-b3c9-f314f3fb7c5e | cert-portal.siemens.com | |
| www.openwall.com/lists/oss-security/2023/12/26/4 | af854a3a-2127-422b-91ae-364da2661108 | www.openwall.com | Mailing List, Third Party Advisory |
| www.openssh.com/txt/release-9.6 | af854a3a-2127-422b-91ae-364da2661108 | www.openssh.com | Release Notes |
| vin01.github.io/piptagole/ssh/security/openssh/libssh/remote-code-execution/2... | af854a3a-2127-422b-91ae-364da2661108 | vin01.github.io | Third Party Advisory |
| www.openwall.com/lists/oss-security/2025/10/12/1 | af854a3a-2127-422b-91ae-364da2661108 | www.openwall.com | |
| support.apple.com/kb/HT214084 | af854a3a-2127-422b-91ae-364da2661108 | support.apple.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 161330 Oracle Enterprise Linux Security Update for openssh (ELSA-2024-0606)
- 161357 Oracle Enterprise Linux Security Update for openssh (ELSA-2024-12164)
- 161396 Oracle Enterprise Linux Security Update for openssh (ELSA-2024-1130)
- 200022 Ubuntu Security Notification for OpenSSH Vulnerabilities (USN-6565-1)
- 200041 Ubuntu Security Notification for OpenSSH Vulnerabilities (USN-6560-2)
- 242805 Red Hat Update for openssh (RHSA-2024:0606)
- 242828 Red Hat Update for openssh (RHSA-2024:0594)
- 242841 Red Hat Update for openssh (RHSA-2024:0455)
- 242848 Red Hat Update for openssh (RHSA-2024:0429)
- 243017 Red Hat Update for openssh (RHSA-2024:1130)
- 296108 Oracle Solaris 11.4 Support Repository Update (SRU) 66.164.1 Missing (CPUJAN2024)
- 330166 IBM Advanced Interactive eXecutive (AIX) Multiple Vulnerabilities (openssh_advisory16)
- 357354 Amazon Linux Security Advisory for openssh : ALAS2023-2024-570
- 357364 Amazon Linux Security Advisory for openssh : ALAS2-2024-2507
- 379289 Alibaba Cloud Linux Security Update for openssh (ALINUX2-SA-2024:0006)
- 379342 Alibaba Cloud Linux Security Update for openssh (ALINUX3-SA-2024:0013)
- 379478 Apple macOS Sonoma 14.4 Not Installed (HT214084)
- 38915 OpenSSH Multiple Vulnerabilities
- 510681 Alpine Linux Security Update for openssh
- 510754 Alpine Linux Security Update for openssh
- 6000398 Debian Security Update for openssh (DSA 5586-1)
- 6000403 Debian Security Update for openssh (DLA 3694-1)
- 673413 EulerOS Security Update for openssh (EulerOS-SA-2024-1183)
- 673655 EulerOS Security Update for openssh (EulerOS-SA-2024-1203)
- 673788 EulerOS Security Update for openssh (EulerOS-SA-2024-1321)
- 673811 EulerOS Security Update for openssh (EulerOS-SA-2024-1286)
- 673872 EulerOS Security Update for openssh (EulerOS-SA-2024-1343)
- 673894 EulerOS Security Update for openssh (EulerOS-SA-2024-1241)
- 673937 EulerOS Security Update for openssh (EulerOS-SA-2024-1219)
- 710818 Gentoo Linux OpenSSH Multiple Vulnerabilities (GLSA 202312-17)
- 755826 SUSE Enterprise Linux Security Update for openssh (SUSE-SU-2024:0596-1)
- 755829 SUSE Enterprise Linux Security Update for openssh (SUSE-SU-2024:0604-1)
- 755830 SUSE Enterprise Linux Security Update for openssh (SUSE-SU-2024:0603-1)
- 941560 AlmaLinux Security Update for openssh (ALSA-2024:0606)
- 941612 AlmaLinux Security Update for openssh (ALSA-2024:1130)
- 961110 Rocky Linux Security Update for openssh (RLSA-2024:0606)