POC详情: 9fb5ec4c793f1482a430deb06f9ca1e775925afa

来源
关联漏洞
标题: libssh server-side state machine 安全漏洞 (CVE-2018-10933)
描述:libssh是一个用于访问SSH服务的C语言开发包,它能够执行远程命令、文件传输,同时为远程的程序提供安全的传输通道。server-side state machine是其中的一个服务器端状态机。 libssh的server-side state machine 0.7.6之前版本和0.8.4之前版本中存在安全漏洞。攻击者可借助恶意的客户端利用该漏洞在不进行身份验证的情况下创建通道,进而获取未授权的访问权限。
描述
CVE-2018-10933 POC (LIBSSH)
介绍
# POC of CVE-2018-10933
A vulnerability was found in libssh's server-side state machine before versions 0.7.6 and 0.8.4. A malicious client could create channels without first performing authentication, resulting in unauthorized access.

### Usage : 
```
python3 libssh.py -s SERVER_ADD -u USERNAME -c COMMMAND_TO_EXEC
```
### Original advisory details:

Peter Winter-Smith discovered that libssh incorrectly handled authentication when being used as a server. A remote attacker could use this issue to bypass authentication without any credentials.

### Update instructions
The problem can be corrected by updating your system to the following package versions:

Ubuntu 18.10
libssh-4 - 0.8.1-1ubuntu0.1
To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to reboot your computer to make all the necessary changes.

- https://www.securityfocus.com/bid/105677
- https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-10933.html?_ga=2.25655988.847624248.1540329509-967710194.1540329509
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10933
文件快照

[4.0K] /data/pocs/9fb5ec4c793f1482a430deb06f9ca1e775925afa ├── [2.0K] libssh.py ├── [ 34K] LICENSE └── [1.1K] README.md 0 directories, 3 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。