VYPR
High severityNVD Advisory· Published Aug 24, 2022· Updated Aug 3, 2024

CVE-2022-36633

CVE-2022-36633

Description

Teleport 9.3.6 is vulnerable to Command injection leading to Remote Code Execution. An attacker can craft a malicious ssh agent installation link by URL encoding a bash escape with carriage return line feed. This url encoded payload can be used in place of a token and sent to a user in a social engineering attack. This is fully unauthenticated attack utilizing the trusted teleport server to deliver the payload.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Teleport 9.3.6 is vulnerable to unauthenticated command injection via a crafted SSH agent installation link, leading to remote code execution through social engineering.

Vulnerability

CVE-2022-36633 is a command injection vulnerability in Teleport 9.3.6, specifically in the web endpoint that generates node join scripts. The token parameter is not properly sanitized, allowing an attacker to inject arbitrary bash commands using URL-encoded carriage return line feed (CRLF) characters [1][3].

Exploitation

An attacker can craft a malicious SSH agent installation link by replacing the legitimate token with a URL-encoded payload. This link is then sent to a target user via social engineering. When the victim clicks the link, the Teleport server processes the request and generates a script containing the injected commands, which are then executed on the server [3][4]. No authentication is required, and the attack leverages the trusted Teleport server to deliver the payload.

Impact

Successful exploitation allows an unauthenticated attacker to achieve remote code execution on the Teleport server. This could lead to full compromise of the infrastructure managed by Teleport, including servers, databases, and Kubernetes clusters [3].

Mitigation

The vulnerability is patched in later versions of Teleport. The fix validates that the token exists and is valid in the backend, and also removes the user-controlled node-labels parameter that was also exploitable [1][4]. Users should update to a patched version immediately.

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
github.com/gravitational/teleportGo
< 8.3.178.3.17
github.com/gravitational/teleportGo
>= 9.0.0, < 9.3.139.3.13
github.com/gravitational/teleportGo
>= 10.0.0, < 10.1.210.1.2

Affected products

4

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

9

News mentions

0

No linked articles in our index yet.