Any user authorized to connect to a ssh server using sshproxy can inject options to the ssh command executed by sshproxy.
All versions of sshproxy are impacted.
The problem is patched starting on version 1.6.3
The only workaround is to use the force_command option in sshproxy.yaml, but it's rarely relevant.
{
"severity": "LOW",
"nvd_published_at": "2024-05-14T16:17:27Z",
"github_reviewed_at": "2024-05-14T20:16:33Z",
"github_reviewed": true,
"cwe_ids": [
"CWE-77"
]
}