vendor:
libssh
by:
Anonymous
7.5
CVSS
HIGH
Authentication Bypass
287
CWE
Product Name: libssh
Affected Version From: 0.6.0
Affected Version To: 0.7.5
Patch Exists: YES
Related CWE: CVE-2018-10933
CPE: a:libssh:libssh:0.6.0
Metasploit:
https://www.rapid7.com/db/vulnerabilities/alpine-linux-cve-2018-10933/, https://www.rapid7.com/db/vulnerabilities/huawei-euleros-2_0_sp3-cve-2018-10933/, https://www.rapid7.com/db/vulnerabilities/f5-big-ip-cve-2018-10933/, https://www.rapid7.com/db/vulnerabilities/freebsd-cve-2018-10933/, https://www.rapid7.com/db/vulnerabilities/ubuntu-cve-2018-10933/, https://www.rapid7.com/db/vulnerabilities/libssh-cve-2018-10933/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2018-10933/, https://www.rapid7.com/db/vulnerabilities/debian-cve-2018-10933/
Other Scripts:
N/A
Platforms Tested: Linux, Mac, Windows
2019
libSSH Authentication Bypass
This exploit allows an attacker to bypass authentication on libSSH servers without credentials. It works by sending a message with the USERAUTH_SUCCESS flag to the server, which will then allow the attacker to open a session and invoke a shell.
Mitigation:
Upgrade to libSSH version 0.7.6 or later.