Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2018-15473 PoC — OpenSSH 竞争条件问题漏洞

Source
Associated Vulnerability
Title:OpenSSH 竞争条件问题漏洞 (CVE-2018-15473)
Description:OpenSSH through 7.7 is prone to a user enumeration vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c.
Description
SSH User Enumerator in Python3, CVE-2018-15473, I updated the code of this exploit (https://www.exploit-db.com/exploits/45939) to work with python3 instead of python2.
Readme
# SSH-User-Enum-Python3-CVE-2018-15473

SSH User Enumerator in Python3, CVE-2018-15473, I've updated the code of this exploit (https://www.exploit-db.com/exploits/45939) to work with python3 instead of python2, and I'm trying to implement functionalities to enumerate more users instead of only one.

<h2>OpenSSH < 7.7 - User Enumeration Scripts (Python3)</h2>

<h3>sshuserenum3.py</h3>

Works fine, how to use:

```
python3 sshuserenum3.py 10.10.10.84 -p 22 root

IP = positional argument
-p to specify the SSH port
user(for example root) to try the existence of a user (positional argument)
```

<h3>casi.py</h3>

```
TO DO, STILL NOT DONE, Trying to implement a wordlist function.
```

File Snapshot

[4.0K] /data/pocs/5675254c7ec94cf9a3ca750e4792a17ec772c8b2 ├── [4.7K] casi2.py ├── [4.9K] casi.py ├── [6.9K] LICENSE ├── [ 689] README.md └── [2.5K] sshuserenum3.py 0 directories, 5 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →