sshpiper is a reverse proxy for sshd. Starting in version 1.0.50 and prior to version 1.3.0, the way the proxy protocol listener is implemented in sshpiper can allow an attacker to forge their connecting address. Commit 2ddd69876a1e1119059debc59fe869cb4e754430 added the proxy protocol listener as the only listener in sshpiper, with no option to toggle this functionality off. This means that any connection that sshpiper is directly (or in some cases indirectly) exposed to can use proxy protocol to forge its source address. Any users of sshpiper who need logs from it for whitelisting/rate limiting/security investigations could have them become much less useful if an attacker is sending a spoofed source address. Version 1.3.0 contains a patch for the issue.
                
            References
                    Configurations
                    No configuration.
History
                    21 Nov 2024, 09:19
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | 
 | |
| References | () https://github.com/tg123/sshpiper/commit/2ddd69876a1e1119059debc59fe869cb4e754430 - | |
| References | () https://github.com/tg123/sshpiper/commit/70fb830dca26bea7ced772ce5d834a3e88ae7f53 - | |
| References | () https://github.com/tg123/sshpiper/security/advisories/GHSA-4w53-6jvp-gg52 - | 
14 May 2024, 22:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2024-05-14 22:15
Updated : 2024-11-21 09:19
NVD link : CVE-2024-35175
Mitre link : CVE-2024-35175
CVE.ORG link : CVE-2024-35175
JSON object : View
Products Affected
                No product.
CWE
                
                    
                        
                        CWE-345
                        
            Insufficient Verification of Data Authenticity
