The Go SSH library (x/crypto/ssh) by default does not verify host keys, facilitating man-in-the-middle attacks. Default behavior changed in commit e4e2799 to require explicitly registering a hostkey verification mechanism.
Weaknesses in this category are related to the design and implementation of data confidentiality and integrity. Frequently these deal with the use of encoding techniques, encryption libraries, and hashing algorithms. The weaknesses in this category could lead to a degradation of the quality data if they are not addressed.
Link | Tags |
---|---|
https://godoc.org/golang.org/x/crypto/ssh | vendor advisory |
https://github.com/golang/go/issues/19767 | third party advisory |
https://bridge.grumpy-troll.org/2017/04/golang-ssh-security/ | third party advisory |
https://github.com/golang/crypto/commit/e4e2799dd7aab89f583e1d898300d96367750991 | third party advisory patch |
http://www.securityfocus.com/bid/97481 | vdb entry third party advisory |