header-logo
Suggest Exploit
vendor:
FreeSSHD
by:
Kingcope
7,5
CVSS
HIGH
Authentication Bypass
287
CWE
Product Name: FreeSSHD
Affected Version From: All versions
Affected Version To: All versions
Patch Exists: Yes
Related CWE: N/A
CPE: a:freesshd:freesshd
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows, Linux, Mac
2011

FreeSSHD all version Remote Authentication Bypass ZERODAY

FreeSSHD all versions are vulnerable to a remote authentication bypass vulnerability. This vulnerability was discovered and exploited by Kingcope in 2011. To exploit this vulnerability, an attacker can use the ssh.exe command with a valid username and the host. Valid usernames can include root, admin, administrator, webadmin, sysadmin, netadmin, guest, user, web, test, ssh, sftp, ftp, or anything else the attacker can imagine. The vulnerable banner of the most recent version is SSH-2.0-WeOnlyDo 2.1.3.

Mitigation:

Users should upgrade to the latest version of FreeSSHD to mitigate this vulnerability.
Source

Exploit-DB raw data:

FreeSSHD all version Remote Authentication Bypass ZERODAY
Discovered & Exploited by Kingcope
Year 2011

# Exploit-DB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23080.zip

Run like:

ssh.exe -l<valid username> <host>

valid username might be:

root
admin
administrator
webadmin
sysadmin
netadmin
guest
user
web
test
ssh
sftp
ftp

or anything you can imagine.


The vulnerable banner of the most recent version is:

SSH-2.0-WeOnlyDo 2.1.3


For your pleasure,

KingcopeFreeSSHD all version Remote Authentication Bypass ZERODAY
Discovered & Exploited by Kingcope
Year 2011

Run like:

ssh.exe -l<valid username> <host>

valid username might be:

root
admin
administrator
webadmin
sysadmin
netadmin
guest
user
web
test
ssh
sftp
ftp

or anything you can imagine.


The vulnerable banner of the most recent version is:

SSH-2.0-WeOnlyDo 2.1.3


For your pleasure,

Kingcope