关联漏洞
描述
Nmap .nse script to scan for CVE-2022-32073 in wolfssh
介绍
# Python program to detect vulnerability with CVE-2022-32073 in large networks
This python program runs nmap on an address passed as an argument, by default it runs on all ports but port number can also be given as an argument. It runs nmap with custom created **wolf_ssh_version.nse** scripts which uses fingerprinting to identify **wolfSSH v1.4.7** which contains an integer overflow vulnerability with assigned **CVE-2022-32073.** Program can be run on any machine which has following prerequisites installed: **nmap** and also **python3** along with necessary libraries.
### Run the program with following commands
To see options and description run the program with the following command.
python3 scanner_for_CVE-2022-32073.py --help
To run the program on a given address or address range and scan all ports on each host use the following command
python3 scanner_for_CVE-2022-32073.py -a IP
To run the program on a given address or address range and scan given port or port range on each host use the following command
python3 scanner_for_CVE-2022-32073.py -a IP -p PORTS
### Sample usage and output
The screenshot shows sample use of the programs fingerprinting ability and output formatting on a different version of SSH.

### Resources
For more info refer to the Documentation.pdf or refer to the https://nmap.org/.
文件快照
[4.0K] /data/pocs/8799a5c71eb0cefbb4ef1b88a4931335b6a4ea36
├── [586K] Documentation.pdf
├── [1.0K] LICENSE
├── [1.4K] README.md
├── [ 86K] sample_usage.png
├── [3.1K] scanner_for_CVE-2022-32073.py
├── [1.6K] wolf_ssh_version.nse
└── [ 94K] zadanie_projektu_Gregus.pdf
0 directories, 7 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。