vendor:
OpenSSH
by:
Adam Simuntis and Mindaugas Slusnys
7.5
CVSS
HIGH
Misconfiguration
16
CWE
Product Name: OpenSSH
Affected Version From: OpenSSH 6.6 and below
Affected Version To: OpenSSH 6.6 and below
Patch Exists: YES
Related CWE: N/A
CPE: a:openbsd:openssh
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: Linux
2014
OpenSSH <= 6.6 SFTP misconfiguration exploit for 32/64bit Linux
This exploit is based on a misconfiguration vulnerability in OpenSSH versions 6.6 and below. It was originally discovered by Jann Horn and further developed by Adam Simuntis and Mindaugas Slusnys. The exploit uses the Paramiko library to connect to the SSH server and then downloads the /proc/self/maps file to identify the address of the libc library. It then downloads the libc library and extracts the system() and exit() addresses. It then builds a payload which is written to the remote system and executed. The payload contains a RET slide which is used to execute the system() command with the command specified in the payload.
Mitigation:
Ensure that OpenSSH is updated to the latest version and that all misconfigurations are addressed.