Lucene search

K
seebugRootSSV:60544
HistoryDec 26, 2012 - 12:00 a.m.

FreeSSHd freeSSHd.exe 远程身份验证绕过漏洞

2012-12-2600:00:00
Root
www.seebug.org
25

0.249 Low

EPSS

Percentile

96.7%

BUGTRAQ ID: 56785
CVE(CAN) ID: CVE-2012-6066

freeSSHd是开源的SSH和SFTP服务器。

freeFTPd和其内置SFTP服务器存在身份验证绕过漏洞,在提供证书之前,打开SSH通道可绕过身份验证。未经身份验证的远程攻击者可利用此漏洞登录,而不提供任何证书,登录后,上传特制的文件可以系统权限执行任意代码。
0
freeSSHd 1.2.6
厂商补丁:

freeSSHd

目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:

http://freesshd.com/


                                                FreeSSHD all version Remote Authentication Bypass ZERODAY
Discovered & Exploited by Kingcope
Year 2011

http://www.exploit-db.com/sploits/23080.zip

Run like:

ssh.exe -l<valid username> <host>

valid username might be:

root
admin
administrator
webadmin
sysadmin
netadmin
guest
user
web
test
ssh
sftp
ftp

or anything you can imagine.


The vulnerable banner of the most recent version is:

SSH-2.0-WeOnlyDo 2.1.3


For your pleasure,

KingcopeFreeSSHD all version Remote Authentication Bypass ZERODAY
Discovered & Exploited by Kingcope
Year 2011

Run like:

ssh.exe -l<valid username> <host>

valid username might be:

root
admin
administrator
webadmin
sysadmin
netadmin
guest
user
web
test
ssh
sftp
ftp

or anything you can imagine.


The vulnerable banner of the most recent version is:

SSH-2.0-WeOnlyDo 2.1.3


For your pleasure,

Kingcope
                              

0.249 Low

EPSS

Percentile

96.7%