{"id":"PYSEC-2023-237","details":"An issue in AsyncSSH v2.14.0 and earlier allows attackers to control the extension info message (RFC 8308) via a man-in-the-middle attack.","aliases":["CVE-2023-46445","GHSA-cfc2-wr2v-gxm5"],"modified":"2023-11-17T17:41:55.151148Z","published":"2023-11-14T03:15:00Z","references":[{"type":"ADVISORY","url":"https://github.com/ronf/asyncssh/security/advisories/GHSA-cfc2-wr2v-gxm5"}],"affected":[{"package":{"name":"asyncssh","ecosystem":"PyPI","purl":"pkg:pypi/asyncssh"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.14.1"}]}],"versions":["0.8.1","0.8.2","0.8.3","0.8.4","0.9.0","0.9.1","0.9.2","1.0.0","1.0.1","1.1.0","1.1.1","1.10.0","1.10.1","1.11.0","1.11.1","1.12.0","1.12.1","1.12.2","1.13.0","1.13.1","1.13.2","1.13.3","1.14.0","1.15.0","1.15.1","1.16.0","1.16.1","1.17.0","1.17.1","1.18.0","1.2.0","1.2.1","1.3.0","1.3.1","1.3.2","1.4.0","1.4.1","1.5.0","1.5.1","1.5.2","1.5.3","1.5.4","1.5.5","1.5.6","1.6.0","1.6.1","1.6.2","1.7.1","1.7.2","1.7.3","1.8.0","1.8.1","1.9.0","2.0.0","2.0.1","2.1.0","2.10.0","2.10.1","2.11.0","2.12.0","2.13.0","2.13.1","2.13.2","2.14.0","2.2.0","2.2.1","2.3.0","2.4.0","2.4.1","2.4.2","2.5.0","2.6.0","2.7.0","2.7.1","2.7.2","2.8.0","2.8.1","2.9.0"],"database_specific":{"source":"https://github.com/pypa/advisory-database/blob/main/vulns/asyncssh/PYSEC-2023-237.yaml"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"}]}