logo

CVE-2018-7750 paramiko

Package

Manager: pip
Name: paramiko
Vulnerable Version: >=2.0.0 <2.0.8 || >=2.1.0 <2.1.5 || >=2.2.0 <2.2.3 || >=2.3.0 <2.3.2 || =2.4.0 || >=2.4.0 <2.4.1 || >=1.18.0 <1.18.5 || >=0 <1.17.6

Severity

Level: Critical

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.16742 pctl0.94684

Details

Paramiko not properly checking authentication before processing other requests transport.py in the SSH server implementation of Paramiko before 1.17.6, 1.18.x before 1.18.5, 2.0.x before 2.0.8, 2.1.x before 2.1.5, 2.2.x before 2.2.3, 2.3.x before 2.3.2, and 2.4.x before 2.4.1 does not properly check whether authentication is completed before processing other requests, as demonstrated by channel-open. A customized SSH client can simply skip the authentication step.

Metadata

Created: 2018-07-12T20:29:30Z
Modified: 2024-10-09T19:47:17Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2018/07/GHSA-232r-66cg-79px/GHSA-232r-66cg-79px.json
CWE IDs: ["CWE-287"]
Alternative ID: GHSA-232r-66cg-79px
Finding: F039
Auto approve: 1