POC详情: 8799a5c71eb0cefbb4ef1b88a4931335b6a4ea36

来源
关联漏洞
标题: wolfSSH 输入验证错误漏洞 (CVE-2022-32073)
描述:wolfSSH是一个小型、快速、可移植的 SSH 实现,包括对 SCP 和 SFTP 的支持。 wolfSSH v1.4.7版本存在安全漏洞,该漏洞源于其函数wolfSSH_SFTP_RecvRMDIR存在一个整数溢出。
描述
Nmap .nse script to scan for CVE-2022-32073 in wolfssh
介绍
# Python program to detect vulnerability with CVE-2022-32073 in large networks

This python program runs nmap on an address passed as an argument, by default it runs on all ports but port number can also be given as an argument. It runs nmap with custom created **wolf_ssh_version.nse** scripts which uses fingerprinting to identify **wolfSSH v1.4.7** which contains an integer overflow vulnerability with assigned **CVE-2022-32073.** Program can be run on any machine which has following prerequisites installed: **nmap** and also **python3** along with necessary libraries. 

### Run the program with following commands
To see options and description run the program with the following command. 

    python3 scanner_for_CVE-2022-32073.py --help
    
To run the program on a given address or address range and scan all ports on each host use the following command

    python3 scanner_for_CVE-2022-32073.py -a IP
    
To run the program on a given address or address range and scan given port or port range on each host use the following command
    
    python3 scanner_for_CVE-2022-32073.py -a IP -p PORTS 

### Sample usage and output
The screenshot shows sample use of the programs fingerprinting ability and output formatting on a different version of SSH.

![sample progr. usage](/sample_usage.png "Sample use of the programm on a different version of SSH.")

### Resources

For more info refer to the Documentation.pdf or refer to the https://nmap.org/. 






文件快照

[4.0K] /data/pocs/8799a5c71eb0cefbb4ef1b88a4931335b6a4ea36 ├── [586K] Documentation.pdf ├── [1.0K] LICENSE ├── [1.4K] README.md ├── [ 86K] sample_usage.png ├── [3.1K] scanner_for_CVE-2022-32073.py ├── [1.6K] wolf_ssh_version.nse └── [ 94K] zadanie_projektu_Gregus.pdf 0 directories, 7 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。