关联漏洞
标题:
OpenSSH 竞争条件问题漏洞
(CVE-2018-15473)
描述:OpenSSH(OpenBSD Secure Shell)是OpenBSD计划组的一套用于安全访问远程计算机的连接工具。该工具是SSH协议的开源实现,支持对所有的传输进行加密,可有效阻止窃听、连接劫持以及其他网络级的攻击。 OpenSSH 7.7及之前版本中存在竞争条件问题漏洞。该漏洞源于网络系统或产品在运行过程中,并发代码需要互斥地访问共享资源时,对于并发访问的处理不当。
介绍
# Vulnerability Testing Framework
This repository provides tools and scripts for developing and testing vulnerabilities, specifically targeting CVE-2018-15473 and SNMPv1/2 Public Community Strings.
## Overview
### Vulnerabilities Covered
- **CVE-2018-15473**: A vulnerability in certain OpenSSH server versions that allows enumeration of valid usernames.
- **SNMPv1/2 Public Community Strings**: Exploitation of default SNMP community strings, which can lead to unauthorized access to network devices.
## Report
A comprehensive analysis of the vulnerabilities, including findings and test results, is available in the `REPORT.md` file.
## Contact
For further inquiries or feedback, please reach out to [mahdiosm2@gmail.com](mailto:mahdiosm2@gmail.com).
## License
This project is licensed under the MIT License. See the [LICENSE](LICENSE) file for details.
文件快照
[4.0K] /data/pocs/051b3a01a384372ee68d61394aac9741e2ae988f
├── [4.0K] Docker
│ ├── [1.4K] Dockerfile.ssh-snmp
│ └── [ 77] start_services.sh
├── [1.0K] LICENSE
├── [ 867] README.md
├── [891K] Report.pdf
└── [4.0K] Tools
├── [ 602] README.txt
├── [178K] SnmpWalk.zip
├── [6.1K] sshtranger_things.py
└── [8.9K] sshUsernameEnumExploit.py
2 directories, 9 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。