vendor:
Paramiko
by:
Adam Brown
9.8
CVSS
CRITICAL
Authentication Bypass
287
CWE
Product Name: Paramiko
Affected Version From: < 1.17.6, 1.18.x < 1.18.5, 2.0.x < 2.0.8, 2.1.x < 2.1.5, 2.2.x < 2.2.3, 2.3.x < 2.3.2, and 2.4.x < 2.4.1
Affected Version To: 2.4.1
Patch Exists: YES
Related CWE: CVE-2018-7750
CPE: a:paramiko:paramiko
Metasploit:
https://www.rapid7.com/db/vulnerabilities/amazon_linux-cve-2018-7750/, https://www.rapid7.com/db/vulnerabilities/redhat_linux-cve-2018-7750/, https://www.rapid7.com/db/vulnerabilities/oracle_linux-cve-2018-7750/, https://www.rapid7.com/db/vulnerabilities/debian-cve-2018-7750/, https://www.rapid7.com/db/vulnerabilities/centos_linux-cve-2018-7750/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2018-7750/, https://www.rapid7.com/db/vulnerabilities/ubuntu-cve-2018-7750/, https://www.rapid7.com/db/vulnerabilities/oracle-solaris-cve-2018-7750/
Other Scripts:
N/A
Platforms Tested: Multiple
2018
Paramiko 2.4.1 – Authentication Bypass
This PoC is based on discussions found at the following github issue: https://github.com/paramiko/paramiko/issues/1175 TLDR, Paramiko doesn't check if the client has completed the authentication step before allowing the client to open channels. The PoC below connects to an SFTP server, and lists the root directory without authenticating. Slight modification is required if you want to open an SSH channel.
Mitigation:
Upgrade to Paramiko version 1.17.6, 1.18.5, 2.0.8, 2.1.5, 2.2.3, 2.3.2, or 2.4.1