Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-6387 PoC — OpenSSH 安全漏洞

Source
Associated Vulnerability
Title:OpenSSH 安全漏洞 (CVE-2024-6387)
Description:OpenSSH(OpenBSD Secure Shell)是加拿大OpenBSD计划组的一套用于安全访问远程计算机的连接工具。该工具是SSH协议的开源实现,支持对所有的传输进行加密,可有效阻止窃听、连接劫持以及其他网络级的攻击。 OpenSSH 存在安全漏洞,该漏洞源于信号处理程序中存在竞争条件,攻击者利用该漏洞可以在无需认证的情况下远程执行任意代码并获得系统控制权。
Readme
# Project Information
<p><b><h6>Name Project :</b>POC - CVE-2024-6387 - Scanner</p>
<p><b>Last version  :</b>1.0.0</p>
<p><b>Last updated :</b> 09/07/2024</p>
<p><b>Programming language :</b> Python</p>
<p><b>Company name : </b><a target="_black" href="http://acyber.ir">acyber</a> (IT Security Lab Iran)</p></h6>
<h4>CVE-2024-6387</h4>
<p>
regreSSHion, CVE-2024-6387, is an unauthenticated remote code execution in OpenSSH’s server (sshd) that grants full root access. It affects the default configuration and does not require user interaction. It poses a significant exploit risk.
<br>
<h4>About OpenSSH?</h4>
OpenSSH is a suite of secure networking utilities based on the SSH protocol that are essential for secure communication over unsecured networks. It provides robust encryption, secure file transfers, and remote server management. OpenSSH is widely used on Unix-like systems, including macOS and Linux, and it supports various encryption technologies and enforces robust access controls. Despite a recent vulnerability, OpenSSH maintains a strong security record, exemplifying a defense-in-depth approach and a critical tool for maintaining network communication confidentiality and integrity worldwide.
</p>


# Contacts
<ul>
<li>   Author      :   Mohamamd javad Joshani Disfani (mr.mtwoj)
<li>   Linkedin    :   https://ir.linkedin.com/in/joshani
<li>   E-Mail      :   mr.mtwoj@gmail.com
<li>   Website     :   www.acyber.ir
<li>   Twitter     :   <a href="https://twitter.com/MrMtwoj">@mrmtwoj</a>
<li>   Github      :   https://github.com/mrmtwoj/CVE-2024-6387
</ul>
File Snapshot

[4.0K] /data/pocs/aabb4a64e91ec7ca59cbd4d174f14cf3faee078f ├── [2.0K] cve-2024-6387.py ├── [ 142] ips.txt └── [1.5K] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.