GHSA-6xf3-5hp7-xqqg

Source
https://github.com/advisories/GHSA-6xf3-5hp7-xqqg
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/08/GHSA-6xf3-5hp7-xqqg/GHSA-6xf3-5hp7-xqqg.json
Aliases
Published
2022-08-25T00:00:28Z
Modified
2023-11-08T04:10:03.310271Z
Details

Teleport 9.3.6 is vulnerable to Command injection leading to Remote Code Execution. An attacker can craft a malicious ssh agent installation link by URL encoding a bash escape with carriage return line feed. This url encoded payload can be used in place of a token and sent to a user in a social engineering attack. This is fully unauthenticated attack utilizing the trusted teleport server to deliver the payload.

References

Affected packages

Go / github.com/gravitational/teleport

Affected ranges

Type
SEMVER
Events
Introduced
0The exact introduced commit is unknown
Fixed
8.3.17

Go / github.com/gravitational/teleport

Affected ranges

Type
SEMVER
Events
Introduced
9.0.0
Fixed
9.3.13

Go / github.com/gravitational/teleport

Affected ranges

Type
SEMVER
Events
Introduced
10.0.0
Fixed
10.1.2