关联漏洞
描述
LibSSH authentification bypass
介绍
# CVE-2018-10933 - SSH Authentication Bypass PoC
## Description
CVE-2018-10933 is an authentication bypass vulnerability in the server-side implementation of **libssh**. The flaw allows an attacker to send a `SSH2_MSG_USERAUTH_SUCCESS` message without any prior authentication, gaining unauthorized access.
## Impacted Systems
Any server using vulnerable versions of **libssh** for SSH services is affected.
## Vulnerable Versions
- libssh 0.6 and above
- Fixed in versions: 0.7.6 and 0.8.4
---
## Usage
1. Replace `ip` in the script with the target's IP address.
2. Run the script:
```bash
pip install paramiko
python3 CVE_2018_10933.py
文件快照
[4.0K] /data/pocs/a5fa0866b06722e5ab42c3ed4554a97aa8ee3182
├── [ 646] README.md
└── [ 956] SSH_auth_bypass.py
0 directories, 2 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。