ID CVE-2018-3737
Summary sshpk is vulnerable to ReDoS when parsing crafted invalid public keys.
References
Vulnerable Configurations
  • cpe:2.3:a:joyent:sshpk:1.0.0:*:*:*:*:node.js:*:*
    cpe:2.3:a:joyent:sshpk:1.0.0:*:*:*:*:node.js:*:*
  • cpe:2.3:a:joyent:sshpk:1.0.1:*:*:*:*:node.js:*:*
    cpe:2.3:a:joyent:sshpk:1.0.1:*:*:*:*:node.js:*:*
  • cpe:2.3:a:joyent:sshpk:1.0.2:*:*:*:*:node.js:*:*
    cpe:2.3:a:joyent:sshpk:1.0.2:*:*:*:*:node.js:*:*
  • cpe:2.3:a:joyent:sshpk:1.0.3:*:*:*:*:node.js:*:*
    cpe:2.3:a:joyent:sshpk:1.0.3:*:*:*:*:node.js:*:*
  • cpe:2.3:a:joyent:sshpk:1.0.4:*:*:*:*:node.js:*:*
    cpe:2.3:a:joyent:sshpk:1.0.4:*:*:*:*:node.js:*:*
  • cpe:2.3:a:joyent:sshpk:1.1.0:*:*:*:*:node.js:*:*
    cpe:2.3:a:joyent:sshpk:1.1.0:*:*:*:*:node.js:*:*
  • cpe:2.3:a:joyent:sshpk:1.2.0:*:*:*:*:node.js:*:*
    cpe:2.3:a:joyent:sshpk:1.2.0:*:*:*:*:node.js:*:*
  • cpe:2.3:a:joyent:sshpk:1.2.1:*:*:*:*:node.js:*:*
    cpe:2.3:a:joyent:sshpk:1.2.1:*:*:*:*:node.js:*:*
  • cpe:2.3:a:joyent:sshpk:1.3.0:*:*:*:*:node.js:*:*
    cpe:2.3:a:joyent:sshpk:1.3.0:*:*:*:*:node.js:*:*
  • cpe:2.3:a:joyent:sshpk:1.4.0:*:*:*:*:node.js:*:*
    cpe:2.3:a:joyent:sshpk:1.4.0:*:*:*:*:node.js:*:*
  • cpe:2.3:a:joyent:sshpk:1.4.1:*:*:*:*:node.js:*:*
    cpe:2.3:a:joyent:sshpk:1.4.1:*:*:*:*:node.js:*:*
  • cpe:2.3:a:joyent:sshpk:1.4.2:*:*:*:*:node.js:*:*
    cpe:2.3:a:joyent:sshpk:1.4.2:*:*:*:*:node.js:*:*
  • cpe:2.3:a:joyent:sshpk:1.4.3:*:*:*:*:node.js:*:*
    cpe:2.3:a:joyent:sshpk:1.4.3:*:*:*:*:node.js:*:*
  • cpe:2.3:a:joyent:sshpk:1.4.4:*:*:*:*:node.js:*:*
    cpe:2.3:a:joyent:sshpk:1.4.4:*:*:*:*:node.js:*:*
  • cpe:2.3:a:joyent:sshpk:1.4.5:*:*:*:*:node.js:*:*
    cpe:2.3:a:joyent:sshpk:1.4.5:*:*:*:*:node.js:*:*
  • cpe:2.3:a:joyent:sshpk:1.4.6:*:*:*:*:node.js:*:*
    cpe:2.3:a:joyent:sshpk:1.4.6:*:*:*:*:node.js:*:*
  • cpe:2.3:a:joyent:sshpk:1.4.7:*:*:*:*:node.js:*:*
    cpe:2.3:a:joyent:sshpk:1.4.7:*:*:*:*:node.js:*:*
  • cpe:2.3:a:joyent:sshpk:1.5.0:*:*:*:*:node.js:*:*
    cpe:2.3:a:joyent:sshpk:1.5.0:*:*:*:*:node.js:*:*
  • cpe:2.3:a:joyent:sshpk:1.5.1:*:*:*:*:node.js:*:*
    cpe:2.3:a:joyent:sshpk:1.5.1:*:*:*:*:node.js:*:*
  • cpe:2.3:a:joyent:sshpk:1.6.0:*:*:*:*:node.js:*:*
    cpe:2.3:a:joyent:sshpk:1.6.0:*:*:*:*:node.js:*:*
  • cpe:2.3:a:joyent:sshpk:1.6.1:*:*:*:*:node.js:*:*
    cpe:2.3:a:joyent:sshpk:1.6.1:*:*:*:*:node.js:*:*
  • cpe:2.3:a:joyent:sshpk:1.6.2:*:*:*:*:node.js:*:*
    cpe:2.3:a:joyent:sshpk:1.6.2:*:*:*:*:node.js:*:*
  • cpe:2.3:a:joyent:sshpk:1.7.0:*:*:*:*:node.js:*:*
    cpe:2.3:a:joyent:sshpk:1.7.0:*:*:*:*:node.js:*:*
  • cpe:2.3:a:joyent:sshpk:1.7.1:*:*:*:*:node.js:*:*
    cpe:2.3:a:joyent:sshpk:1.7.1:*:*:*:*:node.js:*:*
  • cpe:2.3:a:joyent:sshpk:1.7.2:*:*:*:*:node.js:*:*
    cpe:2.3:a:joyent:sshpk:1.7.2:*:*:*:*:node.js:*:*
  • cpe:2.3:a:joyent:sshpk:1.7.3:*:*:*:*:node.js:*:*
    cpe:2.3:a:joyent:sshpk:1.7.3:*:*:*:*:node.js:*:*
  • cpe:2.3:a:joyent:sshpk:1.7.4:*:*:*:*:node.js:*:*
    cpe:2.3:a:joyent:sshpk:1.7.4:*:*:*:*:node.js:*:*
  • cpe:2.3:a:joyent:sshpk:1.8.0:*:*:*:*:node.js:*:*
    cpe:2.3:a:joyent:sshpk:1.8.0:*:*:*:*:node.js:*:*
  • cpe:2.3:a:joyent:sshpk:1.8.1:*:*:*:*:node.js:*:*
    cpe:2.3:a:joyent:sshpk:1.8.1:*:*:*:*:node.js:*:*
  • cpe:2.3:a:joyent:sshpk:1.8.2:*:*:*:*:node.js:*:*
    cpe:2.3:a:joyent:sshpk:1.8.2:*:*:*:*:node.js:*:*
  • cpe:2.3:a:joyent:sshpk:1.8.3:*:*:*:*:node.js:*:*
    cpe:2.3:a:joyent:sshpk:1.8.3:*:*:*:*:node.js:*:*
  • cpe:2.3:a:joyent:sshpk:1.9.0:*:*:*:*:node.js:*:*
    cpe:2.3:a:joyent:sshpk:1.9.0:*:*:*:*:node.js:*:*
  • cpe:2.3:a:joyent:sshpk:1.9.1:*:*:*:*:node.js:*:*
    cpe:2.3:a:joyent:sshpk:1.9.1:*:*:*:*:node.js:*:*
  • cpe:2.3:a:joyent:sshpk:1.9.2:*:*:*:*:node.js:*:*
    cpe:2.3:a:joyent:sshpk:1.9.2:*:*:*:*:node.js:*:*
  • cpe:2.3:a:joyent:sshpk:1.10.0:*:*:*:*:node.js:*:*
    cpe:2.3:a:joyent:sshpk:1.10.0:*:*:*:*:node.js:*:*
  • cpe:2.3:a:joyent:sshpk:1.10.2:*:*:*:*:node.js:*:*
    cpe:2.3:a:joyent:sshpk:1.10.2:*:*:*:*:node.js:*:*
  • cpe:2.3:a:joyent:sshpk:1.11.0:*:*:*:*:node.js:*:*
    cpe:2.3:a:joyent:sshpk:1.11.0:*:*:*:*:node.js:*:*
  • cpe:2.3:a:joyent:sshpk:1.12.0:*:*:*:*:node.js:*:*
    cpe:2.3:a:joyent:sshpk:1.12.0:*:*:*:*:node.js:*:*
  • cpe:2.3:a:joyent:sshpk:1.13.0:*:*:*:*:node.js:*:*
    cpe:2.3:a:joyent:sshpk:1.13.0:*:*:*:*:node.js:*:*
  • cpe:2.3:a:joyent:sshpk:1.13.1:*:*:*:*:node.js:*:*
    cpe:2.3:a:joyent:sshpk:1.13.1:*:*:*:*:node.js:*:*
CVSS
Base: 5.0 (as of 30-01-2023 - 16:06)
Impact:
Exploitability:
CWE CWE-185
CAPEC
  • Argument Injection
    An attacker changes the behavior or state of a targeted application through injecting data or command syntax through the targets use of non-validated and non-filtered arguments of exposed services or methods.
  • Using Slashes in Alternate Encoding
    This attack targets the encoding of the Slash characters. An attacker would try to exploit common filtering problems related to the use of the slashes characters to gain access to resources on the target host. Directory-driven systems, such as file systems and databases, typically use the slash character to indicate traversal between directories or other container components. For murky historical reasons, PCs (and, as a result, Microsoft OSs) choose to use a backslash, whereas the UNIX world typically makes use of the forward slash. The schizophrenic result is that many MS-based systems are required to understand both forms of the slash. This gives the attacker many opportunities to discover and abuse a number of common filtering problems. The goal of this pattern is to discover server software that only applies filters to one version, but not the other.
  • Command Delimiters
    An attack of this type exploits a programs' vulnerabilities that allows an attacker's commands to be concatenated onto a legitimate command with the intent of targeting other resources such as the file system or database. The system that uses a filter or a blacklist input validation, as opposed to whitelist validation is vulnerable to an attacker who predicts delimiters (or combinations of delimiters) not present in the filter or blacklist. As with other injection attacks, the attacker uses the command delimiter payload as an entry point to tunnel through the application and activate additional attacks through SQL queries, shell commands, network scanning, and so on.
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:N/A:P
redhat via4
rpms
  • rh-nodejs8-nodejs-0:8.17.0-2.el7
  • rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7
  • rh-nodejs8-nodejs-devel-0:8.17.0-2.el7
  • rh-nodejs8-nodejs-docs-0:8.17.0-2.el7
  • rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7
refmap via4
misc https://hackerone.com/reports/319593
Last major update 30-01-2023 - 16:06
Published 07-06-2018 - 02:29
Last modified 30-01-2023 - 16:06
Back to Top