Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-25136 PoC — OpenSSH 资源管理错误漏洞

Source
Associated Vulnerability
Title:OpenSSH 资源管理错误漏洞 (CVE-2023-25136)
Description:OpenSSH server (sshd) 9.1 introduced a double-free vulnerability during options.kex_algorithms handling. This is fixed in OpenSSH 9.2. The double free can be leveraged, by an unauthenticated remote attacker in the default configuration, to jump to any location in the sshd address space. One third-party report states "remote code execution is theoretically possible."
Description
OpenSSH 9.1漏洞大规模扫描和利用
Readme
CVE-2023-25136

OpenSSH 9.1漏洞大规模扫描和利用


*脆弱性的详细信息


OpenSSH是一种实现SSH协议的软件,通常用于以安全的方式连接到Linux(或Windows)机器以执行远程管理。


OpenSSH 9.1中引入的CVE-2023-25136安全漏洞影响SSH预身份验证过程。通过利用它,攻击者可以破坏内存并在机器上执行任意代码,而无需对目标服务器进行身份验证。


#使用


运行脚本选择“IP地址列表扫描”或“直接利用易受攻击的IP”


#requirements


•Paramiko:要安装,只需键入

``pip install paramiko``


•Pyfiglet:要安装它,只需键入

``pip install pyfiglet``


•TermColor:要安装,只需键入

``pip install termcolor``


#Dork


使用https://www.criminalip.io/asset/search?query=IP


DORK:`ssh-2.0-openssh-9.1`` 
File Snapshot

[4.0K] /data/pocs/f1594103fd3b4aad5e7ad7e02b336217b6195207 ├── [ 904] openssh-9_1.py ├── [ 558] openssh-9_1-single_exploit.py └── [ 854] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →