POC详情: 01925a5a5b77f8d3cbab442a898b18c1c38b7214

来源
关联漏洞
标题: OpenSSH 安全漏洞 (CVE-2024-6387)
描述:OpenSSH(OpenBSD Secure Shell)是加拿大OpenBSD计划组的一套用于安全访问远程计算机的连接工具。该工具是SSH协议的开源实现,支持对所有的传输进行加密,可有效阻止窃听、连接劫持以及其他网络级的攻击。 OpenSSH 存在安全漏洞,该漏洞源于信号处理程序中存在竞争条件,攻击者利用该漏洞可以在无需认证的情况下远程执行任意代码并获得系统控制权。
描述
openssh-cve-2024-6387.sh
介绍
# OpenSSH CVE-2024-6387

A vulnerability (CVE-2024-6387) has been discovered in OpenSSH. Successful exploitation of this vulnerability allows a remote, unauthenticated attacker to execute arbitrary code as root on the target machine.
All the glibc-based Linux distributions that have OpenSSH exposed are vulnerable to this issue.

## What should you do?
1. If you use virtual machines, bare-metal servers, or computers operating on Linux and accessible from the Internet, update firewall rules that may allow SSH through TCP on any port or limit the source IPs to trusted networks.
2. If OpenSSH needs to be left on, you can also execute a configuration update which eliminates the race case condition for the exploit. This is a runtime mitigation. To apply the changes in the sshd config, this script will restart the sshd service:

## Step by step:
1. Clone this repository
   ```
   git clone https://github.com/rumochnaya/openssh-cve-2024-6387.sh.git
   ```
3. Open directory
   ```
   cd openssh-cve-2024-6387.sh
   ```
5. Make a script executable
   ```
   chmod +x openssh-cve-2024-6387.sh
   ```
6. Run the script
   ```
   sudo ./openssh-cve-2024-6387.sh
   ```

## Done!
But be careful, update Linux at the first opportunity.
文件快照

[4.0K] /data/pocs/01925a5a5b77f8d3cbab442a898b18c1c38b7214 ├── [ 600] openssh-cve-2024-6387.sh └── [1.2K] README.md 0 directories, 2 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。