FreeSSHd freeSSHd.exe 远程身份验证绕过漏洞

2012-12-26T00:00:00
ID SSV:60544
Type seebug
Reporter Root
Modified 2012-12-26T00:00:00

Description

BUGTRAQ ID: 56785 CVE(CAN) ID: CVE-2012-6066

freeSSHd是开源的SSH和SFTP服务器。

freeFTPd和其内置SFTP服务器存在身份验证绕过漏洞,在提供证书之前,打开SSH通道可绕过身份验证。未经身份验证的远程攻击者可利用此漏洞登录,而不提供任何证书,登录后,上传特制的文件可以系统权限执行任意代码。 0 freeSSHd 1.2.6 厂商补丁:

freeSSHd

目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:

http://freesshd.com/

                                        
                                            
                                                FreeSSHD all version Remote Authentication Bypass ZERODAY
Discovered & Exploited by Kingcope
Year 2011

http://www.exploit-db.com/sploits/23080.zip

Run like:

ssh.exe -l<valid username> <host>

valid username might be:

root
admin
administrator
webadmin
sysadmin
netadmin
guest
user
web
test
ssh
sftp
ftp

or anything you can imagine.


The vulnerable banner of the most recent version is:

SSH-2.0-WeOnlyDo 2.1.3


For your pleasure,

KingcopeFreeSSHD all version Remote Authentication Bypass ZERODAY
Discovered & Exploited by Kingcope
Year 2011

Run like:

ssh.exe -l<valid username> <host>

valid username might be:

root
admin
administrator
webadmin
sysadmin
netadmin
guest
user
web
test
ssh
sftp
ftp

or anything you can imagine.


The vulnerable banner of the most recent version is:

SSH-2.0-WeOnlyDo 2.1.3


For your pleasure,

Kingcope