Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-6387 PoC — Openssh: regresshion - race condition in ssh allows rce/dos

Source
Associated Vulnerability
Title:Openssh: regresshion - race condition in ssh allows rce/dos (CVE-2024-6387)
Description:A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.
Description
OpenSSH RCE Massive Vulnerable Scanner
Readme
# OpenSSH CVE Scanner

The OpenSSH CVE Scanner is a Python script designed to scan multiple SSH targets for vulnerabilities based on their OpenSSH version. It utilizes threading for concurrent scanning and integrates logging with colored output for enhanced visibility.

## Features

- **Multi-threaded Scanning:** Utilizes threading to concurrently scan multiple targets, improving efficiency.
- **CVE Vulnerability Detection:** Checks SSH versions against a predefined list of CVE vulnerabilities to determine if a version is vulnerable.
- **Logging and Output:** Logs scan results to a file (`scan.log`) and optionally saves vulnerable targets to an output file.
- **Color-coded Output:** Uses Colorama and Coloredlogs to provide color-coded terminal output for clear status indication.
- **Interrupt Handling:** Supports Ctrl+C to gracefully terminate the script while ensuring ongoing threads complete their tasks.

## Usage

1. **Setup:**
   - Ensure Python dependencies (`coloredlogs`, `packaging`) are installed (`pip install coloredlogs packaging`).

2. **Running the Scanner:**
   - Provide a file (`-f`) containing a list of targets in the format `ip:port`.
   - Optionally specify an output file (`-o`) to save vulnerable targets.
   - Adjust the number of threads (`-t`) based on system resources or scanning requirements.

3. **Example Command:**
   ```bash
   python open_ssh_scanner.py -f targets.txt -o vulnerable_ips.txt -t 5
File Snapshot

[4.0K] /data/pocs/7a11faf8d4505d63374c04b91aa7d9b4c42a13e5 ├── [1.4K] README.md └── [7.3K] scanner.py 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →