Miggo Logo

CVE-2023-35887:
Apache MINA SSHD information disclosure vulnerability

5

CVSS Score

Basic Information

EPSS Score
-
Published
7/10/2023
Updated
12/7/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.apache.sshd:sshd-coremaven>= 1.0.0, < 2.1.02.1.0
org.apache.sshd:sshd-commonmaven>= 2.1.0, < 2.9.32.9.3
org.apache.sshd:sshd-sftpmaven>= 1.0.0, < 2.9.32.9.3

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from improper path validation in RootedFileSystemProvider. Key issues included: 1) resolveLocalPath didn't properly normalize paths against the root, allowing traversal. 2) createSymbolicLink didn't validate symlink targets. 3) Directory stream handling leaked absolute paths. The commit adds chroot path normalization, symlink validation, and secure directory stream wrappers to contain paths within the root. The affected functions are clearly identified in the diff through security-critical changes like IoUtils.chroot calls and validateSafeRelativeSymlink checks.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*xposur* o* S*nsitiv* In*orm*tion to *n Un*ut*oriz** **tor vuln*r**ility in *p**** So*tw*r* *oun**tion *p**** MIN*. In S*TP s*rv*rs impl*m*nt** usin* *p**** MIN* SS** t**t us* * Root***il*Syst*m, lo**** us*rs m*y ** **l* to *is*ov*r "*xists/*o*s not

Reasoning

T** vuln*r**ility st*ms *rom improp*r p*t* v*li**tion in Root***il*Syst*mProvi**r. K*y issu*s in*lu***: *) r*solv*Lo**lP*t* *i*n't prop*rly norm*liz* p*t*s ***inst t** root, *llowin* tr*v*rs*l. *) *r**t*Sym*oli*Link *i*n't v*li**t* symlink t*r**ts. *