# CVE-2024-6387-Updated-SSH-RCE
CVE-2024-6387 for SSH RCE in Python [Update]
0day for OpenSSH's sshd on glibc-based Linux systems
> The repository provides a working variant of the CVE-2024-6387 vulnerability exploit with support for real-time active shell, multithreading, entering targets from a file, and color output.
## Description
An exploit for CVE-2024-6387, targeting a signal handler race condition in OpenSSH's server (sshd) on glibc-based Linux systems. The vulnerability allows for remote code execution as root due to async-signal-unsafe functions being called in the SIGALRM handler.
## Exploit details
The exploit targets the SIGALRM handler race condition in OpenSSH's sshd, which calls async-signal-unsafe functions. This can be leveraged to achieve remote code execution as root.
## Vulnerable versions:
OpenSSH 8.5p1 to 9.8p1
## Running
To run exploit you need Python 3.
Execute:
```bash
python exploit.py -h 1.1.1.1 -c 22
```
## Download
After payment, take a screenshot and send it to my email. I will answer within an hour.
olifer.ford@gmail.com
Price 50usd
usdt trc20:
```
TMt5mkrjefAsiSK3h639MePzzW18G9Wz9A
```
[4.0K] /data/pocs/a21746f29ce5361f9ceae7b5cdc844791613e4a7
└── [1.1K] README.md
0 directories, 1 file