POC详情: bcbd006ed040e2d54585e856954029961366256d

来源
关联漏洞
标题: OpenSSL 缓冲区错误漏洞 (CVE-2022-3602)
描述:OpenSSL是OpenSSL团队的一个开源的能够实现安全套接层(SSLv2/v3)和安全传输层(TLSv1)协议的通用加密库。该产品支持多种加密算法,包括对称密码、哈希算法、安全散列算法等。 OpenSSL 3.0.0 到 3.0.6版本存在安全漏洞,该漏洞源于在 X.509 证书验证中可以触发缓冲区溢出,特别是在名称约束检查中,攻击者利用该漏洞可以导致服务崩溃(导致拒绝服务)或潜在的远程代码执行。
介绍
# CVE-2022-3602-and-CVE-2022-3786
This is a detection script which will determine whether client authentication is required by the SSL server, 
in which case servers based on OpenSSL 3.0.0 to 3.0.6 will be vulnerable to both CVE-2022-3602 and CVE-2022-3786

## Prerequisite's
- python3
- pip install -r requirements.txt

## Usage
```
usage: openssl_cert_detector.py [-h] [-t TARGET] [-T TARGETS]

optional arguments:
  -h, --help            show this help message and exit
  -t TARGET, --target TARGET
                        Single IP with port separate by colon. Example: -t 192.168.0.3:3000
  -T TARGETS, --targets TARGETS
                        List of IP and port separate by colon and separated by new line in text file
```

### Example 1:
To check for openssl vulnerability on single ip and port 

```
python openssl_cert_detector.py -t 192.168.0.3:3000
```

### Example 2:

To check for openssl vulnerability on list of ip and its port in separated by new line in text file

```
python openssl_cert_detector.py -T check.txt
```

## References
- https://github.com/colmmacc/CVE-2022-3602
- https://github.com/DataDog/security-labs-pocs/tree/main/proof-of-concept-exploits/openssl-punycode-vulnerability
- https://github.com/jfrog/jfrog-openssl-tools
文件快照

[4.0K] /data/pocs/bcbd006ed040e2d54585e856954029961366256d ├── [4.0K] Images │   ├── [ 18K] openssl-2-1.png │   ├── [2.9K] openssl-3.png │   └── [ 10K] openssl.png ├── [2.8K] openssl_cert_detector.py ├── [1.2K] README.md └── [ 19] requirements.txt 1 directory, 6 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。