POC详情: 2a6dec07fae86e2740fc4b27f0d285bccb1f8965

来源
关联漏洞
标题: OpenSSH 安全漏洞 (CVE-2023-51385)
描述:OpenSSH(OpenBSD Secure Shell)是加拿大OpenBSD计划组的一套用于安全访问远程计算机的连接工具。该工具是SSH协议的开源实现,支持对所有的传输进行加密,可有效阻止窃听、连接劫持以及其他网络级的攻击。 OpenSSH 9.6之前版本存在安全漏洞,该漏洞源于存在操作系统命令注入漏洞。
描述
This repository contains a proof-of-concept (PoC) for exploiting the OpenSSH ProxyCommand vulnerability — CVE-2025-51385 — affecting OpenSSH servers <9.6 Version
介绍
### 🔐 CVE-2023-51385 - OpenSSH ProxyCommand Injection PoC

This repository contains a **proof-of-concept** for CVE-2023-51385, a command injection vulnerability in **OpenSSH's ProxyCommand** option. An attacker with control over SSH configuration or untrusted `ProxyCommand` strings can potentially achieve arbitrary code execution.

📌 **Impact**: Arbitrary command execution via malicious or improperly handled `ProxyCommand` values.
⚠️ **Affected Versions**: OpenSSH versions prior to the patch for CVE-2023-51385.
🔬 **PoC**: Demonstrates how exploitation can occur using a crafted SSH config or command-line input.

> **Note**: This PoC is for **educational and authorized testing purposes only**. Do not use against systems without permission.
>
## Summary

CVE-2023-51385 is a **command injection vulnerability** affecting OpenSSH's `ProxyCommand` option. Under specific conditions, an attacker can exploit improper escaping in SSH configuration or arguments to inject arbitrary commands.

This repository provides a **Proof-of-Concept (PoC)** demonstrating the vulnerability for **educational and authorized penetration testing**.

---

## ⚠️ Affected Versions

- **OpenSSH prior to version 9.8**  
- Vulnerable platforms include Unix/Linux systems where SSH client-side configs or CLI arguments are user-controlled.

---

## 🧠 Vulnerability Details

The issue arises due to **improper sanitization of the `ProxyCommand` value**. If an attacker can influence the `ProxyCommand` field in `.ssh/config` or via CLI, they may inject shell commands.
文件快照

[4.0K] /data/pocs/2a6dec07fae86e2740fc4b27f0d285bccb1f8965 ├── [1.7K] exploit.md ├── [1.0K] LICENSE ├── [1.5K] README.md ├── [ 46K] SSH_Proxycommand1.png ├── [ 28K] SSH_Proxycommand2.png └── [9.2K] SSH_ProxyCommand_Injection1.png 0 directories, 6 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。