Skip to content

zacharimayer/ssh-exploit

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 
 
 
 
 
 
 

Repository files navigation

CVE-2023-25136

OpenSSH 9.1 vulnerability mass scan and exploit

Description

OpenSSH server (sshd) 9.1 introduced a double-free vulnerability during options.kex_algorithms handling. This is fixed in OpenSSH 9.2. The double free can be leveraged, by an unauthenticated remote attacker in the default configuration, to jump to any location in the sshd address space. One third-party report states "remote code execution is theoretically possible." https://nvd.nist.gov/vuln/detail/CVE-2023-25136

Use

  1. Run the scan.py script and enter the file name with IP addresses python scan.py Screenshot_1

  2. Run the exploit.py script and enter the vulnerable IP address python exploit.py Screenshot_2

Requirements

The script runs in Python3 If you don't have the libraries installed, they will be installed when you run the program

• paramiko: to install it just type pip install paramiko

• colorama: to install it just type pip install colorama

LEGAL

This script is intended for educational purposes only. The use of this script for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state, and federal laws. Be careful.

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages