SSH server due to Improper Signature Verification
High
Vulnerability Details
I found that you are using golang.org/x/[email protected] which has a vulnerability that was fixed in this version
golang.org/x/[email protected] but that vulnerability is:
golang.org/x/crypto/ssh is an SSH client and server
Version v0.0.0-20200220183623-bac4c82f6975 of golang.org/x/crypto fixes a vulnerability in the golang.org/x/crypto/ssh package which allowed peers to cause a panic in SSH servers that accept public keys and in any SSH client.
You can check all of the info here with this CVE: CVE-2020-9283.
## Impact
An attacker can craft an ssh-ed25519 or [email protected] public key, such that the library will panic when trying to verify a signature with it. Clients can deliver such a public key and signature to any golang.org/x/crypto/ssh server with a PublicKeyCallback, and servers can deliver them to any golang.org/x/crypto/ssh client.
Actions
View on HackerOneReport Stats
- Report ID: 1294043
- State: Closed
- Substate: not-applicable
- Upvotes: 1