POC详情: 051b3a01a384372ee68d61394aac9741e2ae988f

来源
关联漏洞
标题: OpenSSH 竞争条件问题漏洞 (CVE-2018-15473)
描述:OpenSSH(OpenBSD Secure Shell)是OpenBSD计划组的一套用于安全访问远程计算机的连接工具。该工具是SSH协议的开源实现,支持对所有的传输进行加密,可有效阻止窃听、连接劫持以及其他网络级的攻击。 OpenSSH 7.7及之前版本中存在竞争条件问题漏洞。该漏洞源于网络系统或产品在运行过程中,并发代码需要互斥地访问共享资源时,对于并发访问的处理不当。
介绍
# Vulnerability Testing Framework

This repository provides tools and scripts for developing and testing vulnerabilities, specifically targeting CVE-2018-15473 and SNMPv1/2 Public Community Strings.

## Overview

### Vulnerabilities Covered

- **CVE-2018-15473**: A vulnerability in certain OpenSSH server versions that allows enumeration of valid usernames.
- **SNMPv1/2 Public Community Strings**: Exploitation of default SNMP community strings, which can lead to unauthorized access to network devices.

## Report

A comprehensive analysis of the vulnerabilities, including findings and test results, is available in the `REPORT.md` file.

## Contact

For further inquiries or feedback, please reach out to [mahdiosm2@gmail.com](mailto:mahdiosm2@gmail.com).

## License

This project is licensed under the MIT License. See the [LICENSE](LICENSE) file for details.
文件快照

[4.0K] /data/pocs/051b3a01a384372ee68d61394aac9741e2ae988f ├── [4.0K] Docker │   ├── [1.4K] Dockerfile.ssh-snmp │   └── [ 77] start_services.sh ├── [1.0K] LICENSE ├── [ 867] README.md ├── [891K] Report.pdf └── [4.0K] Tools ├── [ 602] README.txt ├── [178K] SnmpWalk.zip ├── [6.1K] sshtranger_things.py └── [8.9K] sshUsernameEnumExploit.py 2 directories, 9 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。