{"id":"CVE-2022-36633","details":"Teleport 9.3.6 is vulnerable to Command injection leading to Remote Code Execution. An attacker can craft a malicious ssh agent installation link by URL encoding a bash escape with carriage return line feed. This url encoded payload can be used in place of a token and sent to a user in a social engineering attack. This is fully unauthenticated attack utilizing the trusted teleport server to deliver the payload.","aliases":["GHSA-6xf3-5hp7-xqqg"],"modified":"2026-04-10T04:49:41.638912Z","published":"2022-08-24T13:15:08.130Z","related":["CGA-f72c-c7q5-4hc2"],"references":[{"type":"PACKAGE","url":"https://github.com/gravitational/teleport"},{"type":"EVIDENCE","url":"http://packetstormsecurity.com/files/168477/Teleport-10.1.1-Remote-Code-Execution.html"},{"type":"EVIDENCE","url":"https://packetstormsecurity.com/files/168137/Teleport-9.3.6-Command-Injection.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/gravitational/teleport","events":[{"introduced":"0"},{"fixed":"5bc7caf752f6f241708549f189ebe2fef43b7e66"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"10.1.2"}]}}],"versions":["1.0.2","2.1.0-alpha1","teleport-connect-preview-1.0.0.dev.1","v.2.5.0-beta.2","v0.1.0-alpha.10","v0.1.0-alpha.11","v0.1.0-alpha.12","v0.1.0-alpha.15","v0.1.0-alpha.17","v0.1.0-alpha.5","v0.1.0-alpha.6","v0.1.0-alpha.7","v0.1.0-alpha.8","v0.1.0-alpha.9","v0.2.0-alpha.0","v0.2.0-beta.0","v0.2.0-beta.1","v0.2.0-beta.2","v0.2.0-beta.3","v0.2.0-beta.4","v0.2.0-beta.7","v1.0.0","v1.0.3","v1.0.4","v1.0.5","v1.1.0","v1.2.0","v1.3.0","v1.3.1","v10.0.0","v10.0.0-alpha.1","v10.0.0-alpha.2","v10.0.0-rc.1","v10.0.1","v10.0.2","v10.1.0","v10.1.0-dev.ryan.1","v10.1.1","v2.0.0-alpha.6","v2.0.0-alpha.7","v2.0.0-alpha.8","v2.0.0-beta.1","v2.0.0-beta.2","v2.0.0-rc.1","v2.0.0-rc.2","v2.0.0-rc.3","v2.0.0-rc.4","v2.1.0-alpha.2","v2.1.0-alpha.3","v2.1.0-alpha.4","v2.1.0-alpha.5","v2.1.0-alpha.6","v2.2.0","v2.2.0-alpha.8","v2.2.0-alpha.9","v2.2.0-beta.1","v2.2.1","v2.2.2","v2.2.3","v2.3.0","v2.3.0-rc1","v2.3.0-rc2","v2.3.0-rc3","v2.4.0-rc.1","v2.5.0","v2.5.0-alpha.1","v2.5.0-alpha.2","v2.5.0-alpha.3","v2.5.0-alpha.4","v2.5.0-alpha.5","v2.5.0-alpha.6","v2.5.0-beta.1","v2.5.0-beta.2","v2.5.0-rc.1","v2.5.0-rc.2","v2.6.0","v2.6.0-alpha.0","v2.6.0-alpha.1","v2.6.0-alpha.2","v2.6.0-alpha.3","v2.6.0-alpha.4","v2.6.0-alpha.5","v2.6.0-alpha.6","v2.6.0-alpha.7","v2.6.0-alpha.8","v2.6.0-beta.1","v2.6.0-beta.2","v2.6.0-beta.3","v2.6.0-rc.1","v2.6.0-rc.2","v2.6.0-rc.3","v2.7.0-alpha.2","v2.7.0-alpha.3","v2.7.0-alpha.4","v2.7.0-alpha.5","v3.0.0-alpha.4","v3.0.0-alpha.5","v3.0.0-alpha.6","v3.0.0-alpha.7","v3.0.0-alpha.9","v3.0.0-beta.1","v3.0.0-rc.1","v3.0.0-rc.2","v3.0.0-rc.3","v3.0.0-rc.4","v3.0.0-rc.5","v3.0.0-rc.6","v3.1.0-alpha.4","v3.2.0-alpha.1","v3.2.0-alpha.2","v4.0.0-alpha.1","v4.0.0-beta.1","v4.0.0-rc.1","v4.0.0-rc.2","v4.0.0-rc.3","v4.0.0-rc.4","v4.1.0-alpha.2","v4.1.0-alpha.3","v4.1.0-alpha.4","v4.1.0-alpha.5","v4.1.0-beta.1","v4.1.0-beta.2","v4.1.0-beta.3","v4.2.0-alpha.1","v4.2.0-alpha.2","v4.2.0-alpha.3","v4.2.0-alpha.4","v4.2.0-alpha.5","v4.4.0-alpha.1","v6.0.0-alpha.1","v6.0.0-alpha.2","v7.0.0-beta.1","v8.0.0-alpha.1"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-36633.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}