Teleport 9.3.6 is vulnerable to Command injection leading to Remote Code Execution. An attacker can craft a malicious ssh agent installation link by URL encoding a bash escape with carriage return line feed. This url encoded payload can be used in place of a token and sent to a user in a social engineering attack. This is fully unauthenticated attack utilizing the trusted teleport server to deliver the payload.
| Package (Ecosystem) | Introduced | Fixed | Limit |
|---|---|---|---|
| github.com/gravitational/teleport(Go) | 0 | 8.3.17 | N/A |
| github.com/gravitational/teleport(Go) | 9.0.0 | 9.3.13 | N/A |
| github.com/gravitational/teleport(Go) | 10.0.0 | 10.1.2 | N/A |
CVSS Metrics