axylisdead / CVE-2023-25136_POC

CVE-2023-25136 POC written by axylisdead

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

CVE-2023-25136 POC

POC For A Pre Auth Double Free Vulnerability Affecting OpenSSH 9.1 To 9.2


Neccessary libraries

Please make sure you have the following dependencies installed:

  • Python 3 (duh)
  • termcolor
  • argparse
  • fabric

You can also install these libraries directly from the included requirements.txt file using pip.

python3 -m pip install -r requirements.txt


How to use:

To use the script to check if OpenSSH is vulnerable on a single specified IP address, run the script with the -t or the --target parameter, followed by the IP address you wish to test.

NOTE: IT WILL AUTOMATICALLY DEFAULT TO PORT 22

Example: python3 CVE-2023-25136_POC.py -t 127.0.0.1

To check for the vulnerability on more than one IP address, create a file with one IP per line and specify it to the script with the -p or the --filepath parameter.

Example: python3 CVE-2023-25136_POC.py -f listofips.txt


Understanding output

Pretty straight forward, if OpenSSH is exploitable, it will print it 127.0.0.1: Exploitable in green

If it isn't, it will print it 127.0.0.1: Exploitable in red


Credits

This vulnerability was found by Mantas Mikulėnas (grawity) and all credit goes to him.

The proof of concept for this exploit was written by me, Lodzie Kotekya.

You can find me on Telegram or Twitter.


License

This code was proudly written and published under Daddy Stallmans GPL v3 license

About

CVE-2023-25136 POC written by axylisdead

License:GNU General Public License v3.0


Languages

Language:Python 100.0%