CVE-2022-36633: Improper token validation leading to code execution in Teleport
8.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.97041%
CWE
Published
8/25/2022
Updated
8/8/2023
KEV Status
No
Technology
Go
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| github.com/gravitational/teleport | go | < 8.3.17 | 8.3.17 |
| github.com/gravitational/teleport | go | >= 9.0.0, < 9.3.13 | 9.3.13 |
| github.com/gravitational/teleport | go | >= 10.0.0, < 10.1.2 | 10.1.2 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stemmed from improper validation in the node join script generation endpoint. Analysis of the patch (PR #14726) shows the critical fix was adding backend token validation in getJoinScript(). Pre-patch versions would accept any hex-encoded token without verifying its legitimacy, enabling command injection via carriage return/line feed escapes in the token parameter. The function's direct use of untrusted input in script generation without validation matches the CWE-20 and CWE-77 descriptions.