TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

SSH ProxyCommand == unexpected code execution (CVE-2023-51385)

30 点作者 vin10超过 1 年前

2 条评论

cwillu超过 1 年前
From the OpenSSH update:<p>“Although we believe it is the user&#x27;s responsibility to ensure validity of arguments passed to ssh(1), especially across a security boundary such as the git example above, OpenSSH 9.6 now bans most shell metacharacters from user and hostnames supplied via the command-line. This countermeasure is not guaranteed to be effective in all situations, as it is infeasible for ssh(1) to universally filter shell metacharacters potentially relevant to user-supplied commands.” --<a href="https:&#x2F;&#x2F;www.openssh.com&#x2F;txt&#x2F;release-9.6" rel="nofollow noreferrer">https:&#x2F;&#x2F;www.openssh.com&#x2F;txt&#x2F;release-9.6</a><p>It&#x27;s not quite a “root can do things as root” CVE, but honestly it&#x27;s not far off that level of “well, duh”. You can&#x27;t inject untrusted input (a hostname in this case) into a general purpose command stream (i.e., the arguments to bash -c or an exec call), and not expect to have trouble.
评论 #38759540 未加载
评论 #38761387 未加载
评论 #38759741 未加载
bdd8f1df777b超过 1 年前
Wow, this is a security vulnerability potentially affecting me. I&#x27;m using ProxyCommand because GitHub is randomly blocked by the China GFW.
评论 #38761368 未加载
评论 #38771823 未加载
评论 #38760271 未加载