CVE-2018-7750 – paramiko
Package
Manager: pip
Name: paramiko
Vulnerable Version: >=2.0.0 <2.0.8 || >=2.1.0 <2.1.5 || >=2.2.0 <2.2.3 || >=2.3.0 <2.3.2 || =2.4.0 || >=2.4.0 <2.4.1 || >=1.18.0 <1.18.5 || >=0 <1.17.6
Severity
Level: Critical
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.16742 pctl0.94684
Details
Paramiko not properly checking authentication before processing other requests transport.py in the SSH server implementation of Paramiko before 1.17.6, 1.18.x before 1.18.5, 2.0.x before 2.0.8, 2.1.x before 2.1.5, 2.2.x before 2.2.3, 2.3.x before 2.3.2, and 2.4.x before 2.4.1 does not properly check whether authentication is completed before processing other requests, as demonstrated by channel-open. A customized SSH client can simply skip the authentication step.
Metadata
Created: 2018-07-12T20:29:30Z
Modified: 2024-10-09T19:47:17Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2018/07/GHSA-232r-66cg-79px/GHSA-232r-66cg-79px.json
CWE IDs: ["CWE-287"]
Alternative ID: GHSA-232r-66cg-79px
Finding: F039
Auto approve: 1