QID 38901

Date Published: 2023-07-19

QID 38901: OpenSSH Command Injection Vulnerability

OpenSSH (OpenBSD Secure Shell) is a set of computer programs providing encrypted communication sessions over a computer network using the SSH protocol.

OpenSSH contains the following vulnerabilities:
OpenSSH through 8.3p1 allows command injection in the scp.c toremote function, as demonstrated by backtick characters in the destination argument. NOTE: the vendor reportedly has stated that they intentionally omit validation of "anomalous argument transfers" because that could "stand a great chance of breaking existing workflows. Affected Versions:
OpenSSH versions prior to 8.3

QID Detection Logic:
This unauthenticated detection works by reviewing the version of the OpenSSH service.

Successful exploitation allows a remote attacker for command injection in the scp.c toremote function .

  • CVSS V3 rated as High - 7.8 severity.
  • CVSS V2 rated as High - 6.8 severity.
  • Solution
    Customers are advised to upgrade to OpenSSH 8.3 or later to remediate these vulnerabilities.
    Vendor References

    CVEs related to QID 38901

    Software Advisories
    Advisory ID Software Component Link
    OpenSSH 8.3 URL Logo www.openssh.com/