CVE-2022-36633
Description
Teleport 9.3.6 is vulnerable to Command injection leading to Remote Code Execution. An attacker can craft a malicious ssh agent installation link by URL encoding a bash escape with carriage return line feed. This url encoded payload can be used in place of a token and sent to a user in a social engineering attack. This is fully unauthenticated attack utilizing the trusted teleport server to deliver the payload.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Teleport 9.3.6 is vulnerable to unauthenticated command injection via a crafted SSH agent installation link, leading to remote code execution through social engineering.
Vulnerability
CVE-2022-36633 is a command injection vulnerability in Teleport 9.3.6, specifically in the web endpoint that generates node join scripts. The token parameter is not properly sanitized, allowing an attacker to inject arbitrary bash commands using URL-encoded carriage return line feed (CRLF) characters [1][3].
Exploitation
An attacker can craft a malicious SSH agent installation link by replacing the legitimate token with a URL-encoded payload. This link is then sent to a target user via social engineering. When the victim clicks the link, the Teleport server processes the request and generates a script containing the injected commands, which are then executed on the server [3][4]. No authentication is required, and the attack leverages the trusted Teleport server to deliver the payload.
Impact
Successful exploitation allows an unauthenticated attacker to achieve remote code execution on the Teleport server. This could lead to full compromise of the infrastructure managed by Teleport, including servers, databases, and Kubernetes clusters [3].
Mitigation
The vulnerability is patched in later versions of Teleport. The fix validates that the token exists and is valid in the backend, and also removes the user-controlled node-labels parameter that was also exploitable [1][4]. Users should update to a patched version immediately.
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
github.com/gravitational/teleportGo | < 8.3.17 | 8.3.17 |
github.com/gravitational/teleportGo | >= 9.0.0, < 9.3.13 | 9.3.13 |
github.com/gravitational/teleportGo | >= 10.0.0, < 10.1.2 | 10.1.2 |
Affected products
4- Teleport/Teleportdescription
- osv-coords3 versions
< 0+ 2 more
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 8.3.17
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
9- github.com/advisories/GHSA-6xf3-5hp7-xqqgghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2022-36633ghsaADVISORY
- packetstormsecurity.com/files/168477/Teleport-10.1.1-Remote-Code-Execution.htmlghsax_refsource_MISCWEB
- github.com/gravitational/teleport/pull/14726ghsaWEB
- github.com/gravitational/teleport/pull/14726/commits/46c23b9b64b944d1e82d2c8a79083f291ffdd3b6ghsaWEB
- github.com/gravitational/teleport/releases/tag/v10.1.2ghsaWEB
- github.com/gravitational/teleport/releases/tag/v8.3.17ghsaWEB
- github.com/gravitational/teleport/releases/tag/v9.3.13ghsaWEB
- packetstormsecurity.com/files/168137/Teleport-9.3.6-Command-Injection.htmlghsax_refsource_MISCWEB
News mentions
0No linked articles in our index yet.