关联漏洞
标题:OpenSSH 安全漏洞 (CVE-2024-6387)Description:OpenSSH(OpenBSD Secure Shell)是加拿大OpenBSD计划组的一套用于安全访问远程计算机的连接工具。该工具是SSH协议的开源实现,支持对所有的传输进行加密,可有效阻止窃听、连接劫持以及其他网络级的攻击。 OpenSSH 存在安全漏洞,该漏洞源于信号处理程序中存在竞争条件,攻击者利用该漏洞可以在无需认证的情况下远程执行任意代码并获得系统控制权。
介绍
## CVE-2024-6387_Check: A Vulnerability Check Tool
## Description
CVE-2024-6387_Check is a lightweight and efficient tool designed to identify servers running vulnerable versions of OpenSSH, specifically targeting the regreSSHion vulnerability (CVE-2024-6387). This script simplifies the quick analysis of multiple IP addresses, domain names, and CIDR network ranges to detect potential vulnerabilities and ensure your infrastructure remains secure.
## Features
- *Fast Analysis:* Quickly scans multiple IP addresses, domain names, and CIDR ranges for CVE-2024-6387 vulnerability.
- *Banner Retrieval:* Efficiently retrieves SSH banners without authentication.
- *Multi-threading:* Utilizes threads for simultaneous checks, significantly reducing scan time.
- *Detailed Output:* Provides a clear output summarizing the scan results.
- *Port Checking:* Identifies closed ports and provides a summary of unresponsive hosts.
## Usage
`python CVE-2024-6387_Check.py <targets> [--port PORT] [--timeout TIMEOUT] [--list FILE]`
### Examples
#### Single IP
`python CVE-2024-6387_Check.py 192.168.1.1`
#### IPs from a file
`python CVE-2024-6387_Check.py -l ip_list.txt`
#### Multiple IPs and domains
`python CVE-2024-6387_Check.py 192.168.1.1 example.com 192.168.1.2`
#### CIDR range
`python CVE-2024-6387_Check.py 192.168.1.0/24`
#### With custom port
`python CVE-2024-6387_Check.py 192.168.1.1 example.com --port 2222`
文件快照
[4.0K] /data/pocs/6688c053341c9e77aef48972abd4893b22d732c8
├── [7.4K] CVE-2024-6387_Check.py
└── [1.4K] README.md
0 directories, 2 files
备注
1. 建议优先通过来源进行访问。
2. 本地 POC 快照面向订阅用户开放;当原始来源失效或无法访问时,本地镜像作为订阅权益的一部分提供。
3. 持续抓取、验证、维护这份 POC 档案需要不少投入,因此本地快照已纳入付费订阅。您的订阅是让这份资料能继续走下去的关键,由衷感谢。 查看订阅方案 →