ghsa-mjmq-gwgm-5qhm
Vulnerability from github
Published
2023-07-10 18:30
Modified
2023-12-07 18:20
Severity ?
Summary
Apache MINA SSHD information disclosure vulnerability
Details
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache Software Foundation Apache MINA.
In SFTP servers implemented using Apache MINA SSHD that use a RootedFileSystem, logged users may be able to discover "exists/does not exist" information about items outside the rooted tree via paths including parent navigation ("..") beyond the root, or involving symlinks.
This issue affects Apache MINA: from 1.0 before 2.9.3 Users are recommended to upgrade to 2.9.3
Until version 2.1.0, some of the code affected by this vulnerability appeared in org.apache.sshd:sshd-core. Version 2.1.0 contains a commit where the code was moved to the package org.apache.sshd:sshd-common, which did not exist until version 2.1.0.
{ "affected": [ { "package": { "ecosystem": "Maven", "name": "org.apache.sshd:sshd-common" }, "ranges": [ { "events": [ { "introduced": "2.1.0" }, { "fixed": "2.9.3" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Maven", "name": "org.apache.sshd:sshd-sftp" }, "ranges": [ { "events": [ { "introduced": "1.0.0" }, { "fixed": "2.9.3" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Maven", "name": "org.apache.sshd:sshd-core" }, "ranges": [ { "events": [ { "introduced": "1.0.0" }, { "fixed": "2.1.0" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2023-35887" ], "database_specific": { "cwe_ids": [ "CWE-200", "CWE-22" ], "github_reviewed": true, "github_reviewed_at": "2023-07-10T21:53:01Z", "nvd_published_at": "2023-07-10T16:15:53Z", "severity": "MODERATE" }, "details": "Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache Software Foundation Apache MINA.\n\nIn SFTP servers implemented using Apache MINA SSHD that use a RootedFileSystem, logged users may be able to discover \"exists/does not exist\" information about items outside the rooted tree via paths including parent navigation (\"..\") beyond the root, or involving symlinks.\n\nThis issue affects Apache MINA: from 1.0 before 2.9.3 Users are recommended to upgrade to 2.9.3\n\nUntil version 2.1.0, some of the code affected by this vulnerability appeared in org.apache.sshd:sshd-core. Version 2.1.0 contains a [commit](https://github.com/apache/mina-sshd/commit/10de190e7d3f9189deb76b8d08c72334a1fe2df0) where the code was moved to the package org.apache.sshd:sshd-common, which did not exist until version 2.1.0.\n", "id": "GHSA-mjmq-gwgm-5qhm", "modified": "2023-12-07T18:20:03Z", "published": "2023-07-10T18:30:49Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-35887" }, { "type": "WEB", "url": "https://github.com/apache/mina-sshd/pull/362" }, { "type": "WEB", "url": "https://github.com/apache/mina-sshd/commit/10de190e7d3f9189deb76b8d08c72334a1fe2df0" }, { "type": "WEB", "url": "https://github.com/apache/mina-sshd/commit/a61e93035f06bff8fc622ad94870fb773d48b9f0" }, { "type": "WEB", "url": "https://github.com/apache/mina-sshd/commit/c20739b43aab0f7bf2ccad982a6cb37b9d5a8a0b" }, { "type": "PACKAGE", "url": "https://github.com/apache/mina-sshd" }, { "type": "WEB", "url": "https://issues.apache.org/jira/browse/SSHD-1324" }, { "type": "WEB", "url": "https://lists.apache.org/thread/b9qgtqvhnvgfpn0w1gz918p21p53tqk2" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "type": "CVSS_V3" } ], "summary": "Apache MINA SSHD information disclosure vulnerability" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.