/CVE-2023-4596-OpenSSH-Multi-Checker

CVE-2024-6387-checker is a tool or script designed to detect the security vulnerability known as CVE-2024-6387 OpenSSH. CVE-2024-6387 OpenSSH is an entry in the Common Vulnerabilities and Exposures (CVE) that documents security weaknesses discovered in certain software or systems.

Primary LanguageShell

CVE-2024-6387-OpenSSH-Multi-Checker

The CVE-2024-6387-checker.sh script is a tool designed to check multiple targets (IPs or hostnames) at once for the CVE-2024-6387 vulnerability. This script performs a local OpenSSH version check, scans remote servers for SSH banners, and determines whether they are vulnerable to CVE-2024-6387. Inspection results are presented in an easy-to-read report.

Main Features

  • Automatic Installation of nmap: Ensures nmap is installed on the system before scanning.
  • Local OpenSSH Version Scan: Checks whether the local OpenSSH version is vulnerable.
  • Multiple Target Scanning: Enables scanning multiple targets at once.
  • Customizable Port Scanning: Users can specify the ports to scan (default 22).
  • Detailed Report: Presents a report showing which servers are vulnerable, not vulnerable, or have closed ports.

How the Script Works

  1. Nmap Installation: The script checks if nmap is installed and tries to install it if it is not found.
  2. Local OpenSSH Version Check: Checks the OpenSSH version on the local machine and compares it to the list of vulnerable versions.
  3. Remote Server Scan: Uses nmap to get the SSH banner of the target server and check its version.
  4. Vulnerability Identification: Checks whether the OpenSSH version from the banner is included in the list of vulnerable versions or is excluded.
  5. Reporting: Presents scan results in an easy-to-read format.

Script Usage

To run the script, use the following command in the terminal:

./CVE-2024-6387-checker.sh [options] [target(s)]

Options

  • -p, --port [PORT]: Specifies the port to scan (default 22).
  • -h, --help: Display help and exit messages.

Target

The IP address or hostname of the server to be scanned.

Usage Example

./CVE-2024-6387-checker.sh 192.168.1.1
./CVE-2024-6387-checker.sh -p 2222 192.168.1.1 192.168.1.2
./CVE-2024-6387-checker.sh --help

This script helps users check multiple servers for the CVE-2024-6387 vulnerability in an efficient and structured way.

License

This project is licensed under the MIT License - see the LICENSE file for details.

Contributing

Contributions are welcome! Please feel free to submit a Pull Request.

Acknowledgements

Special thanks to all the contributors and the open-source community for their valuable inputs and suggestions.

Contact

For any inquiries or issues, please open an issue on this repository.

Star on GitHub

If you find this project useful, please consider giving it a star on GitHub.

Disclaimer

This script is for educational purposes only. Use it at your own risk.