bugzilla-daemon at bugzilla.mindrot.org
2017-Apr-07 03:27 UTC
[Bug 1762] Improve the documentation w.r.t. "the user's shell"
https://bugzilla.mindrot.org/show_bug.cgi?id=1762 imoverclocked at gmail.com changed: What |Removed |Added ---------------------------------------------------------------------------- Severity|enhancement |security CC| |imoverclocked at gmail.com Component|Documentation |ssh Version|5.5p1 |7.4p1 --- Comment #2 from imoverclocked at gmail.com --- Given the URL in a web browser: "ssh://user at somehost.%60id%3E%2Ftmp%2Fwhoami%60.example.com" iTerm2 currently launches ssh with a hostname of: somehost.`id>/tmp/whoami`.example.com With a vanilla SSH configuration this is ok since SSH errors out with "host not found." However, with a special SSH configuration, a website can execute an arbitrary command: ``` Host * ProxyCommand connect_to %r %h ``` What happened: `id>/tmp/whoami` was executed. What should have happened instead: 1) SSH passes %r/%h as an argument to the ProxyCommand without shell interpolation 2) %h should be validated to adhere to valid punycode 3) Introduce a SafeProxyCommand that only allows safe characters in %r/%h/etc... -- You are receiving this mail because: You are watching the assignee of the bug.
Possibly Parallel Threads
- [Bug 2706] New: remote code execution via ProxyCommand+browser exploit
- [Bug 1762] Improve the documentation w.r.t. "the user's shell"
- Baffling regress/forwarding.sh failure, new in 7.4p1
- Problem with port forwarding on Mac OS X
- [PATCH] allow relative path in streamlocal forwarding