CVE-2023-51385
MEDIUMOpenSSH <9.6 - Command Injection
Title source: llmDescription
In ssh in OpenSSH before 9.6, OS command injection might occur if a user name or host name has shell metacharacters, and this name is referenced by an expansion token in certain situations. For example, an untrusted Git repository can have a submodule with shell metacharacters in a user name or host name.
Exploits (24)
nomisec
NO CODE
by GroundCTL2MajorTom · poc
https://github.com/GroundCTL2MajorTom/CVE-2023-51385P-POC
nomisec
WORKING POC
by saarcastified · poc
https://github.com/saarcastified/CVE-2023-51385---OpenSSH-ProxyCommand-Injection-PoC
References (13)
Scores
CVSS v3
6.5
EPSS
0.1652
EPSS Percentile
94.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
Classification
CWE
CWE-78
Status
published
Affected Products (4)
openbsd/openssh
< 9.6
debian/debian_linux
debian/debian_linux
debian/debian_linux
Timeline
Published
Dec 18, 2023
Tracked Since
Feb 18, 2026