关联漏洞
标题:OpenSSH 资源管理错误漏洞 (CVE-2023-25136)Description:OpenSSH(OpenBSD Secure Shell)是加拿大OpenBSD计划组的一套用于安全访问远程计算机的连接工具。该工具是SSH协议的开源实现,支持对所有的传输进行加密,可有效阻止窃听、连接劫持以及其他网络级的攻击。 OpenSSH 存在资源管理错误漏洞,该漏洞源于options.kex_algorithms 处理期间引入了双重释放漏洞。
Description
OpenSSH 9.1 vulnerability mass scan and exploit
介绍
# CVE-2023-25136
OpenSSH 9.1 vulnerability mass scan and exploit
# Description
OpenSSH server (sshd) 9.1 introduced a double-free vulnerability during options.kex_algorithms handling. This is fixed in OpenSSH 9.2. The double free can be leveraged, by an unauthenticated remote attacker in the default configuration, to jump to any location in the sshd address space. One third-party report states "remote code execution is theoretically possible."
https://nvd.nist.gov/vuln/detail/CVE-2023-25136
# Use
1. Run the scan.py script and enter the file name with IP addresses python scan.py

2. Run the exploit.py script and enter the vulnerable IP address python exploit.py

# Requirements
The script runs in Python3
If you don't have the libraries installed, they will be installed when you run the program
• paramiko: to install it just type pip install paramiko
• colorama: to install it just type pip install colorama
文件快照
[4.0K] /data/pocs/0f7603096d667bdb4b35e005be0916120cbeda17
├── [2.3K] exploit.py
├── [1.1K] README.md
└── [4.6K] scan.py
0 directories, 3 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮件到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对 POC 代码进行快照,为了长期维护,请考虑为本地 POC 付费/捐赠,感谢您的支持。