关联漏洞
标题:
OpenSSH 安全漏洞
(CVE-2024-6387)
描述:OpenSSH(OpenBSD Secure Shell)是加拿大OpenBSD计划组的一套用于安全访问远程计算机的连接工具。该工具是SSH协议的开源实现,支持对所有的传输进行加密,可有效阻止窃听、连接劫持以及其他网络级的攻击。 OpenSSH 存在安全漏洞,该漏洞源于信号处理程序中存在竞争条件,攻击者利用该漏洞可以在无需认证的情况下远程执行任意代码并获得系统控制权。
描述
CVE-2024-6387-Check is a streamlined and efficient tool created to detect servers operating on vulnerable versions of OpenSSH.
介绍
# CVE-2024-6387-Checker
## Description
CVE-2024-6387-Checker is a tool designed to identify servers running vulnerable versions of OpenSSH, specifically targeting the recently discovered regreSSHion vulnerability (CVE-2024-6387). This script facilitates rapid scanning of multiple IP addresses, domain names, and CIDR network ranges to detect potential vulnerabilities and ensure your infrastructure is secure.
## Features
- **Rapid Scanning**: Quickly scan multiple IP addresses, domain names, and CIDR ranges for the CVE-2024-6387 vulnerability.
- **Banner Retrieval**: Efficiently retrieves SSH banners without authentication.
- **Multi-threading**: Uses threading for concurrent checks, significantly reducing scan times.
- **Detailed Output**: Provides clear, emoji-coded output summarizing scan results.
- **Port Check**: Identifies closed ports and provides a summary of non-responsive hosts.
## Usage
```bash
python CVE-2024-6387.py <targets> [--port PORT]
```
### Examples
#### Single IP
```bash
python CVE-2024-6387.py 192.168.1.1
```
#### IPs from a list
```bash
python CVE-2024-6387.py -l ip_list.txt
```
#### Multiple IPs and Domains
```bash
python CVE-2024-6387.py 192.168.1.1 example.com 192.168.1.2
```
#### CIDR Range
```bash
python CVE-2024-6387.py 192.168.1.0/24
```
#### With Custom Port
```bash
python CVE-2024-6387.py 192.168.1.1 example.com --port 2222
```
## References
[Qualys Blog on regreSSHion Vulnerability](https://www.qualys.com/blog/2024/regresshion-vulnerability)
[Qualys TXT on regreSSHion Vulnerability](https://www.qualys.com/2024/07/01/cve-2024-6387/regresshion.txt)
文件快照
[4.0K] /data/pocs/6677f14eac50f3e5830a289a734ecd63c9dddcbd
├── [7.2K] CVE-2024-6387_poc.py
├── [5.7K] CVE-2024-6387.py
└── [1.6K] README.md
0 directories, 3 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。