CVE-2023-43660

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-43660
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-43660.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-43660
Related
  • GHSA-3cjp-w4cp-m9c8
Published
2023-09-27T22:15:10Z
Modified
2025-07-02T00:27:55.490220Z
Severity
  • 8.1 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

Warpgate is a smart SSH, HTTPS and MySQL bastion host for Linux that doesn't need special client apps. The SSH key verification for a user can be bypassed by sending an SSH key offer without a signature. This allows bypassing authentication under following conditions: 1. The attacker knows the username and a valid target name 2. The attacked knows the user's public key and 3. Only SSH public key authentication is required for the user account. This issue has been addressed in version 0.8.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.

References

Affected packages

Git / github.com/warp-tech/warpgate

Affected ranges

Type
GIT
Repo
https://github.com/warp-tech/warpgate
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v0.*

v0.1.0
v0.1.1
v0.2.0
v0.2.1
v0.2.2
v0.2.3
v0.2.4
v0.2.5
v0.3.0
v0.4.0
v0.5.0
v0.6.1
v0.6.2
v0.6.3
v0.6.4
v0.6.5
v0.6.6
v0.7.0
v0.7.1
v0.7.2
v0.7.3
v0.7.4
v0.8.0