module

libssh Authentication Bypass Scanner

Disclosed
2018-10-16
Created
2019-03-19

Description

This module exploits an authentication bypass in libssh server code
where a USERAUTH_SUCCESS message is sent in place of the expected
USERAUTH_REQUEST message. libssh versions 0.6.0 through 0.7.5 and
0.8.0 through 0.8.3 are vulnerable.

Note that this module's success depends on whether the server code
can trigger the correct (shell/exec) callbacks despite only the state
machine's authenticated state being set.

Therefore, you may or may not get a shell if the server requires
additional code paths to be followed.

Authors

Peter Winter-Smith
wvu wvu@metasploit.com

Module Options

To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:


msf > use auxiliary/scanner/ssh/libssh_auth_bypass
msf auxiliary(libssh_auth_bypass) > show actions
...actions...
msf auxiliary(libssh_auth_bypass) > set ACTION < action-name >
msf auxiliary(libssh_auth_bypass) > show options
...show and set options...
msf auxiliary(libssh_auth_bypass) > run

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.