A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead to sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.This script checks if servers are running a vulnerable version of OpenSSH based on specified targets. It uses threading for concurrent scanning of multiple targets and ports.
Installation:
git clone https://github.com/sardine-web/CVE-2024-6387_Check.git
cd CVE-2024-6387_Check
Usage
To check if servers are vulnerable to OpenSSH vulnerabilities:
python main.py <targets> [-p PORT] [-t TIMEOUT]
Options
<targets>: List of IP addresses, domain names, file paths containing IP addresses, or CIDR network ranges.
-p, --port PORT: Port number to check (default: 22).
-t, --timeout TIMEOUT: Connection timeout in seconds (default: 1 second).
Example
Check vulnerabilities for a list of IP addresses:
css
python main.py 192.168.1.1 192.168.1.2 -p 22 -t 2.0
License
This project is licensed under the MIT License - see the LICENSE file for details.
Author
sardine-web - GitHub
Dependencies:
This script uses Python 3. Make sure Python 3 is installed on your system.
socket: Standard library for socket programming.
argparse: Standard library for parsing command-line arguments.
ipaddress: Library for handling IP addresses and networks.
threading: Standard library for multi-threading support.
queue: Standard library for thread-safe queue implementation
[4.0K] /data/pocs/084302af5c72f2c68d320f39ca7b606fe1016f73
├── [4.0K] CVE-2024-6387_Check.py
└── [1.3K] README.md
0 directories, 2 files