Skip to content

axylisdead/CVE-2023-25136_POC

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

4 Commits
 
 
 
 
 
 
 
 

Repository files navigation

CVE-2023-25136 POC

POC For A Pre Auth Double Free Vulnerability Affecting OpenSSH 9.1 To 9.2


Neccessary libraries

Please make sure you have the following dependencies installed:

  • Python 3 (duh)
  • termcolor
  • argparse
  • fabric

You can also install these libraries directly from the included requirements.txt file using pip.

python3 -m pip install -r requirements.txt


How to use:

To use the script to check if OpenSSH is vulnerable on a single specified IP address, run the script with the -t or the --target parameter, followed by the IP address you wish to test.

NOTE: IT WILL AUTOMATICALLY DEFAULT TO PORT 22

Example: python3 CVE-2023-25136_POC.py -t 127.0.0.1

To check for the vulnerability on more than one IP address, create a file with one IP per line and specify it to the script with the -p or the --filepath parameter.

Example: python3 CVE-2023-25136_POC.py -f listofips.txt


Understanding output

Pretty straight forward, if OpenSSH is exploitable, it will print it 127.0.0.1: Exploitable in green

If it isn't, it will print it 127.0.0.1: Exploitable in red


Credits

This vulnerability was found by Mantas Mikulėnas (grawity) and all credit goes to him.

The proof of concept for this exploit was written by me, Lodzie Kotekya.

You can find me on Telegram or Twitter.


License

This code was proudly written and published under Daddy Stallmans GPL v3 license

Releases

No releases published

Packages

No packages published

Languages