com.sshtools:maverick-synergy-server@3.0.0-FINAL vulnerabilities
-
latest version
3.1.1
-
latest non vulnerable version
-
first published
3 years ago
-
latest version published
2 months ago
-
licenses detected
- [3.0.0-RC1,)
-
package manager
Direct Vulnerabilities
Known vulnerabilities in the com.sshtools:maverick-synergy-server package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.Vulnerability | Vulnerable Version |
---|---|
com.sshtools:maverick-synergy-server is a Next Generation Java SSH API Affected versions of this package are vulnerable to Authentication Bypass by Capture-replay during the establishment of the secure channel. An attacker can manipulate handshake sequence numbers to delete messages sent immediately after the channel is established. Note:
Impact: While cryptographically novel, there is no discernable impact on the integrity of SSH traffic beyond giving the attacker the ability to delete the message that enables some features related to keystroke timing obfuscation. To successfully carry out the exploitation, the connection needs to be protected using either the How to fix Authentication Bypass by Capture-replay? Upgrade |
[,3.1.0)
|