Description
Teleport 9.3.6 is vulnerable to Command injection leading to Remote Code Execution. An attacker can craft a malicious ssh agent installation link by URL encoding a bash escape with carriage return line feed. This url encoded payload can be used in place of a token and sent to a user in a social engineering attack. This is fully unauthenticated attack utilizing the trusted teleport server to deliver the payload.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-6xf3-5hp7-xqqg | Improper token validation leading to code execution in Teleport |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-03T10:07:34.522Z
Reserved: 2022-07-25T00:00:00.000Z
Link: CVE-2022-36633
No data.
Status : Modified
Published: 2022-08-24T13:15:08.130
Modified: 2024-11-21T07:13:25.977
Link: CVE-2022-36633
No data.
OpenCVE Enrichment
No data.
Weaknesses
Github GHSA