Executive Summary

Informations
Name CVE-2024-35175 First vendor Publication 2024-05-14
Vendor Cve Last vendor Modification 2024-05-15

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

sshpiper is a reverse proxy for sshd. Starting in version 1.0.50 and prior to version 1.3.0, the way the proxy protocol listener is implemented in sshpiper can allow an attacker to forge their connecting address. Commit 2ddd69876a1e1119059debc59fe869cb4e754430 added the proxy protocol listener as the only listener in sshpiper, with no option to toggle this functionality off. This means that any connection that sshpiper is directly (or in some cases indirectly) exposed to can use proxy protocol to forge its source address. Any users of sshpiper who need logs from it for whitelisting/rate limiting/security investigations could have them become much less useful if an attacker is sending a spoofed source address. Version 1.3.0 contains a patch for the issue.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35175

Sources (Detail)

https://github.com/tg123/sshpiper/commit/2ddd69876a1e1119059debc59fe869cb4e75...
https://github.com/tg123/sshpiper/commit/70fb830dca26bea7ced772ce5d834a3e88ae...
https://github.com/tg123/sshpiper/security/advisories/GHSA-4w53-6jvp-gg52
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
Date Informations
2024-05-15 21:27:25
  • Multiple Updates
2024-05-15 05:27:24
  • First insertion