FreeSSHd freeSSHd.exe 远程身份验证绕过漏洞
发布日期:2012-12-03
更新日期:2012-12-27
受影响系统:
freeSSHd freeSSHd 1.2.6
描述:
--------------------------------------------------------------------------------
BUGTRAQ ID: 56785
CVE(CAN) ID: CVE-2012-6066
freeSSHd是开源的SSH和SFTP服务器。
freeFTPd和其内置SFTP服务器存在身份验证绕过漏洞,在提供证书之前,打开SSH通道可绕过身份验证。未经身份验证的远程攻击者可利用此漏洞登录,而不提供任何证书,登录后,上传特制的文件可以系统权限执行任意代码。
<*来源:Kingcope ([email protected])
链接:http://xforce.iss.net/xforce/xfdb/80476
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-6066
http://www.tenable.com/plugins/index.php?view=single&id=63223
http://www.exploit-db.com/exploits/23080/
*>
测试方法:
--------------------------------------------------------------------------------
警 告
以下程序(方法)可能带有攻击性,仅供安全研究与教学之用。使用者风险自负!
FreeSSHD all version Remote Authentication Bypass ZERODAY
Discovered & Exploited by Kingcope
Year 2011
http://www.exploit-db.com/sploits/23080.zip
Run like:
ssh.exe -l<valid username> <host>
valid username might be:
root
admin
administrator
webadmin
sysadmin
netadmin
guest
user
web
test
ssh
sftp
ftp
or anything you can imagine.
The vulnerable banner of the most recent version is:
SSH-2.0-WeOnlyDo 2.1.3
For your pleasure,
KingcopeFreeSSHD all version Remote Authentication Bypass ZERODAY
Discovered & Exploited by Kingcope
Year 2011
Run like:
ssh.exe -l<valid username> <host>
valid username might be:
root
admin
administrator
webadmin
sysadmin
netadmin
guest
user
web
test
ssh
sftp
ftp
or anything you can imagine.
The vulnerable banner of the most recent version is:
SSH-2.0-WeOnlyDo 2.1.3
For your pleasure,
Kingcope
建议:
--------------------------------------------------------------------------------
厂商补丁:
freeSSHd
--------
目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:
http://freesshd.com/