vulnerability

Amazon Linux 2023: CVE-2023-51385: Medium priority package update for openssh

Severity
6
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:N)
Published
Dec 18, 2023
Added
Feb 17, 2025
Modified
Jul 9, 2025

Description

In ssh in OpenSSH before 9.6, OS command injection might occur if a user name or host name has shell metacharacters, and this name is referenced by an expansion token in certain situations. For example, an untrusted Git repository can have a submodule with shell metacharacters in a user name or host name.
A flaw was found in OpenSSH. In certain circumstances, a remote attacker may be able to execute arbitrary OS commands by using expansion tokens, such as %u or %h, with user names or host names that contain shell metacharacters.

Solutions

amazon-linux-2023-upgrade-opensshamazon-linux-2023-upgrade-openssh-clientsamazon-linux-2023-upgrade-openssh-clients-debuginfoamazon-linux-2023-upgrade-openssh-debuginfoamazon-linux-2023-upgrade-openssh-debugsourceamazon-linux-2023-upgrade-openssh-keycatamazon-linux-2023-upgrade-openssh-keycat-debuginfoamazon-linux-2023-upgrade-openssh-serveramazon-linux-2023-upgrade-openssh-server-debuginfoamazon-linux-2023-upgrade-pam-ssh-agent-authamazon-linux-2023-upgrade-pam-ssh-agent-auth-debuginfo
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.