| Summary: | remote code execution via ProxyCommand+browser exploit | ||
|---|---|---|---|
| Product: | Portable OpenSSH | Reporter: | imoverclocked |
| Component: | ssh | Assignee: | Assigned to nobody <unassigned-bugs> |
| Status: | CLOSED WONTFIX | ||
| Severity: | security | CC: | djm |
| Priority: | P5 | ||
| Version: | 7.4p1 | ||
| Hardware: | All | ||
| OS: | Mac OS X | ||
|
Description
imoverclocked
2017-04-07 13:31:37 AEST
ProxyCommand is explicitly documented as executing its commands via the user's shell, and you've elected to use a ProxyCommand with no quoting. E.g. 'ProxyCommand=connect_to "%r" "%h"' would have been sufficient to avoid this. If you're going to plumb random string from potentially-adversarial sources like a browser then you need to understand the contexts in which they are going to end up used. Since ssh(1) doesn't handler ssh:// URLs itself, you're already doing processing somewhere. That would be the place for this sort of santisation. closing resolved bugs as of 8.6p1 release |