Please make sure you have the following dependencies installed:
- Python 3 (duh)
- termcolor
- argparse
- fabric
You can also install these libraries directly from the included requirements.txt file using pip.
python3 -m pip install -r requirements.txt
To use the script to check if OpenSSH is vulnerable on a single specified IP address, run the script with the -t
or the --target
parameter, followed by the IP address you wish to test.
NOTE: IT WILL AUTOMATICALLY DEFAULT TO PORT 22
Example: python3 CVE-2023-25136_POC.py -t 127.0.0.1
To check for the vulnerability on more than one IP address, create a file with one IP per line and specify it to the script with the -p
or the --filepath
parameter.
Example: python3 CVE-2023-25136_POC.py -f listofips.txt
Pretty straight forward, if OpenSSH is exploitable, it will print it 127.0.0.1: Exploitable
in green
If it isn't, it will print it 127.0.0.1: Exploitable
in red
This vulnerability was found by Mantas Mikulėnas (grawity) and all credit goes to him.
The proof of concept for this exploit was written by me, Lodzie Kotekya.
You can find me on Telegram or Twitter.
This code was proudly written and published under Daddy Stallmans GPL v3 license