Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-51385: n/a

0
Unknown
VulnerabilityCVE-2023-51385cvecve-2023-51385
Published: Mon Dec 18 2023 (12/18/2023, 00:00:00 UTC)
Source: CVE Database V5

Description

In ssh in OpenSSH before 9.6, OS command injection might occur if a user name or host name has shell metacharacters, and this name is referenced by an expansion token in certain situations. For example, an untrusted Git repository can have a submodule with shell metacharacters in a user name or host name.

AI-Powered Analysis

AILast updated: 11/04/2025, 21:37:59 UTC

Technical Analysis

CVE-2023-51385 is a command injection vulnerability identified in OpenSSH versions prior to 9.6. The flaw arises when OpenSSH processes user names or host names containing shell metacharacters (e.g., semicolons, backticks) that are referenced via expansion tokens in certain internal operations. A practical exploitation vector involves untrusted Git repositories that include submodules with maliciously crafted user or host names containing these metacharacters. When OpenSSH interacts with such repositories, it may inadvertently execute injected shell commands, leading to arbitrary code execution on the affected system. This vulnerability does not require prior authentication, increasing its risk profile. While no public exploits have been reported yet, the potential impact is significant given OpenSSH's widespread deployment across servers and development environments. The vulnerability affects environments where OpenSSH is used to interact with Git repositories, particularly in automated or scripted workflows. The lack of a CVSS score suggests this is a newly disclosed issue, but the nature of command injection and the absence of authentication requirements imply a high severity. The vulnerability underscores the importance of sanitizing input data, especially from untrusted sources like external Git repositories, and highlights a risk in how OpenSSH handles expansion tokens referencing user or host names.

Potential Impact

For European organizations, the impact of CVE-2023-51385 could be substantial, especially for those relying heavily on OpenSSH for secure shell access and Git-based development workflows. Successful exploitation could lead to unauthorized remote code execution, compromising system confidentiality, integrity, and availability. Attackers could gain control over critical infrastructure, deploy malware, or exfiltrate sensitive data. Organizations using automated CI/CD pipelines or development environments that clone or interact with external Git repositories are particularly at risk. The vulnerability could disrupt operations, cause data breaches, and damage reputations. Given the prevalence of OpenSSH in European enterprises, government agencies, and cloud providers, the threat surface is broad. Additionally, the ability to exploit this vulnerability without authentication lowers the barrier for attackers, increasing the likelihood of targeted or opportunistic attacks. The absence of known exploits in the wild currently provides a window for proactive mitigation before widespread exploitation occurs.

Mitigation Recommendations

To mitigate CVE-2023-51385, European organizations should immediately upgrade OpenSSH to version 9.6 or later, where the vulnerability has been addressed. Additionally, organizations should audit all Git repositories, especially those imported from external or untrusted sources, to identify and remove submodules with suspicious user or host names containing shell metacharacters. Implement strict input validation and sanitization for user and host names in any custom scripts or automation interacting with OpenSSH or Git. Employ network segmentation and access controls to limit exposure of critical systems running vulnerable OpenSSH versions. Monitor logs for unusual command execution patterns or unexpected Git submodule activity. Where possible, restrict the use of expansion tokens referencing user or host names in automated workflows. Finally, maintain an up-to-date inventory of systems running OpenSSH and ensure timely patch management processes are in place to address future vulnerabilities promptly.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2023-12-18T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 690a6f039e609817bf702c1a

Added to database: 11/4/2025, 9:24:19 PM

Last enriched: 11/4/2025, 9:37:59 PM

Last updated: 11/5/2025, 10:46:51 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats