SSH server due to Improper Signature Verification

Disclosed: 2021-08-30 14:35:11 By escanor56 To sifchain
High
Vulnerability Details
I found that you are using golang.org/x/[email protected] which has a vulnerability that was fixed in this version golang.org/x/[email protected] but that vulnerability is: golang.org/x/crypto/ssh is an SSH client and server Version v0.0.0-20200220183623-bac4c82f6975 of golang.org/x/crypto fixes a vulnerability in the golang.org/x/crypto/ssh package which allowed peers to cause a panic in SSH servers that accept public keys and in any SSH client. You can check all of the info here with this CVE: CVE-2020-9283. ## Impact An attacker can craft an ssh-ed25519 or [email protected] public key, such that the library will panic when trying to verify a signature with it. Clients can deliver such a public key and signature to any golang.org/x/crypto/ssh server with a PublicKeyCallback, and servers can deliver them to any golang.org/x/crypto/ssh client.
Actions
View on HackerOne
Report Stats
  • Report ID: 1294043
  • State: Closed
  • Substate: not-applicable
  • Upvotes: 1
Share this report