Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2018-15473 PoC — OpenSSH 竞争条件问题漏洞

Source
Associated Vulnerability
Title:OpenSSH 竞争条件问题漏洞 (CVE-2018-15473)
Description:OpenSSH through 7.7 is prone to a user enumeration vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c.
Description
Test CVE-2018-15473 exploit on Shodan IP
Readme
Here is a simple script to test CVE-2018-15473 exploit on 100 IP addresses referenced by Shodan. Usernames tested are contained in users.txt

The file that has to be executed is main.py. It works on Linux and you have to get your own API key from www.shodan.io

The results only appear on the standard output. Expect the IP list which is save under ips.txt.

CVE attack forked from https://github.com/Sait-Nuri/CVE-2018-15473

Make sure you have the libraries argparse, shodan and paramiko.
You also can try the following command: chmod +x cve.py

The purpose of this project is purely educational.
File Snapshot

[4.0K] /data/pocs/6ec2ce7f3137bcce034b132d3e726626db7ba875 ├── [3.1K] cve.py ├── [ 579] main.py ├── [ 599] README.md └── [ 244] users.txt 0 directories, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →