Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2018-15473 PoC — OpenSSH 竞争条件问题漏洞

Source
Associated Vulnerability
Title:OpenSSH 竞争条件问题漏洞 (CVE-2018-15473)
Description:OpenSSH through 7.7 is prone to a user enumeration vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c.
Description
Fix for CVE-2018-15473
Readme
# CVE-2018-15473
Updated version of this repo https://github.com/Sait-Nuri/CVE-2018-15473/tree/main
- Made it work with `paramiko` version `3.4.0`

## How To Run
```
# Clone this repo
git clone https://github.com/yZ1337/CVE-2018-15473.git

# Install libraries
pip3 install -r requirements.txt

# Run example list
python3 CVE-2018-15473.py -w /usr/share/seclists/Usernames/xato-net-10-million-usernames.txt

# Run example single user and port
python3 CVE-2018-15473.py -u "root" -p 8080
```
File Snapshot

[4.0K] /data/pocs/f90cd5b3f1956c48f05d027d3c9a37b38ade768d ├── [3.7K] CVE-2018-15473.py ├── [ 34K] LICENSE ├── [ 490] README.md └── [ 25] requirements.txt 0 directories, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →