A race condition exists in Eternal Terminal prior to version 6.2.0 that allows an authenticated attacker to hijack other users' SSH authorization socket, enabling the attacker to login to other systems as the targeted users. The bug is in UserTerminalRouter::getInfoForId().
The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.
Link | Tags |
---|---|
https://github.com/MisterTea/EternalTerminal/commit/900348bb8bc96e1c7ba4888ac8480f643c43d3c3 | third party advisory patch |
https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-85gw-pchc-4rf3 | third party advisory exploit |
http://www.openwall.com/lists/oss-security/2023/02/16/1 | mailing list |