CVE-2020-26301

ssh2 is client and server modules written in pure JavaScript for node.js. In ssh2 before version 1.4.0 there is a command injection vulnerability. The issue only exists on Windows. This issue may lead to remote code execution if a client of the library calls the vulnerable method with untrusted input. This is fixed in version 1.4.0.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:ssh2_project:ssh2:*:*:*:*:*:node.js:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

History

21 Nov 2024, 05:19

Type Values Removed Values Added
References () https://github.com/mscdex/ssh2/commit/f763271f41320e71d5cbee02ea5bc6a2ded3ca21 - Patch, Third Party Advisory () https://github.com/mscdex/ssh2/commit/f763271f41320e71d5cbee02ea5bc6a2ded3ca21 - Patch, Third Party Advisory
References () https://securitylab.github.com/advisories/GHSL-2020-123-mscdex-ssh2/ - Exploit, Patch, Third Party Advisory () https://securitylab.github.com/advisories/GHSL-2020-123-mscdex-ssh2/ - Exploit, Patch, Third Party Advisory
References () https://www.npmjs.com/package/ssh2 - Product, Third Party Advisory () https://www.npmjs.com/package/ssh2 - Product, Third Party Advisory
CVSS v2 : 7.5
v3 : 10.0
v2 : 7.5
v3 : 7.5

Information

Published : 2021-09-20 20:15

Updated : 2024-11-21 05:19


NVD link : CVE-2020-26301

Mitre link : CVE-2020-26301

CVE.ORG link : CVE-2020-26301


JSON object : View

Products Affected

ssh2_project

  • ssh2

microsoft

  • windows
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')