mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-07 03:02:30 +00:00
27 lines
1.2 KiB
Markdown
27 lines
1.2 KiB
Markdown
![]() |
### [CVE-2016-10009](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10009)
|
||
|

|
||
|

|
||
|

|
||
|
|
||
|
### Description
|
||
|
|
||
|
Untrusted search path vulnerability in ssh-agent.c in ssh-agent in OpenSSH before 7.4 allows remote attackers to execute arbitrary local PKCS#11 modules by leveraging control over a forwarded agent-socket.
|
||
|
|
||
|
### POC
|
||
|
|
||
|
#### Reference
|
||
|
- http://packetstormsecurity.com/files/140261/OpenSSH-Arbitrary-Library-Loading.html
|
||
|
- http://packetstormsecurity.com/files/173661/OpenSSH-Forwarded-SSH-Agent-Remote-Code-Execution.html
|
||
|
- https://www.exploit-db.com/exploits/40963/
|
||
|
|
||
|
#### Github
|
||
|
- https://github.com/bioly230/THM_Skynet
|
||
|
- https://github.com/biswajitde/dsm_ips
|
||
|
- https://github.com/gabrieljcs/ips-assessment-reports
|
||
|
- https://github.com/nomi-sec/PoC-in-GitHub
|
||
|
- https://github.com/phx/cvescan
|
||
|
- https://github.com/retr0-13/cveScannerV2
|
||
|
- https://github.com/scmanjarrez/CVEScannerV2
|
||
|
- https://github.com/vshaliii/Basic-Pentesting-2-Vulnhub-Walkthrough
|
||
|
|