[Bug 2706] remote code execution via ProxyCommand+browser exploit

bugzilla-daemon at bugzilla.mindrot.org bugzilla-daemon at bugzilla.mindrot.org
Fri Jun 2 15:03:54 AEST 2017


https://bugzilla.mindrot.org/show_bug.cgi?id=2706

Damien Miller <djm at mindrot.org> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
                 CC|                            |djm at mindrot.org
             Status|NEW                         |RESOLVED
         Resolution|---                         |WONTFIX

--- Comment #1 from Damien Miller <djm at mindrot.org> ---
ProxyCommand is explicitly documented as executing its commands via the
user's shell, and you've elected to use a ProxyCommand with no quoting.
E.g. 'ProxyCommand=connect_to "%r" "%h"' would have been sufficient to
avoid this.

If you're going to plumb random string from potentially-adversarial
sources like a browser then you need to understand the contexts in
which they are going to end up used. Since ssh(1) doesn't handler
ssh:// URLs itself, you're already doing processing somewhere. That
would be the place for this sort of santisation.

-- 
You are receiving this mail because:
You are watching the assignee of the bug.
You are watching someone on the CC list of the bug.


More information about the openssh-bugs mailing list