POC详情: 084302af5c72f2c68d320f39ca7b606fe1016f73

来源
关联漏洞
标题: OpenSSH 安全漏洞 (CVE-2024-6387)
描述:OpenSSH(OpenBSD Secure Shell)是加拿大OpenBSD计划组的一套用于安全访问远程计算机的连接工具。该工具是SSH协议的开源实现,支持对所有的传输进行加密,可有效阻止窃听、连接劫持以及其他网络级的攻击。 OpenSSH 存在安全漏洞,该漏洞源于信号处理程序中存在竞争条件,攻击者利用该漏洞可以在无需认证的情况下远程执行任意代码并获得系统控制权。
描述
A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead to sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.
介绍
This script checks if servers are running a vulnerable version of OpenSSH based on specified targets. It uses threading for concurrent scanning of multiple targets and ports.

Installation:

  git clone https://github.com/sardine-web/CVE-2024-6387_Check.git  
  cd CVE-2024-6387_Check


Usage

To check if servers are vulnerable to OpenSSH vulnerabilities:


python main.py <targets> [-p PORT] [-t TIMEOUT]

Options

    <targets>: List of IP addresses, domain names, file paths containing IP addresses, or CIDR network ranges.
    -p, --port PORT: Port number to check (default: 22).
    -t, --timeout TIMEOUT: Connection timeout in seconds (default: 1 second).

Example

Check vulnerabilities for a list of IP addresses:

css

python main.py 192.168.1.1 192.168.1.2 -p 22 -t 2.0

License

This project is licensed under the MIT License - see the LICENSE file for details.
Author

sardine-web - GitHub

   Dependencies:
   
        This script uses Python 3. Make sure Python 3 is installed on your system.
        socket: Standard library for socket programming.
        argparse: Standard library for parsing command-line arguments.
        ipaddress: Library for handling IP addresses and networks.
        threading: Standard library for multi-threading support.
        queue: Standard library for thread-safe queue implementation
文件快照

[4.0K] /data/pocs/084302af5c72f2c68d320f39ca7b606fe1016f73 ├── [4.0K] CVE-2024-6387_Check.py └── [1.3K] README.md 0 directories, 2 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。