关联漏洞
标题:
OpenSSL 缓冲区错误漏洞
(CVE-2022-3602)
描述:OpenSSL是OpenSSL团队的一个开源的能够实现安全套接层(SSLv2/v3)和安全传输层(TLSv1)协议的通用加密库。该产品支持多种加密算法,包括对称密码、哈希算法、安全散列算法等。 OpenSSL 3.0.0 到 3.0.6版本存在安全漏洞,该漏洞源于在 X.509 证书验证中可以触发缓冲区溢出,特别是在名称约束检查中,攻击者利用该漏洞可以导致服务崩溃(导致拒绝服务)或潜在的远程代码执行。
介绍
# CVE-2022-3602-and-CVE-2022-3786
This is a detection script which will determine whether client authentication is required by the SSL server,
in which case servers based on OpenSSL 3.0.0 to 3.0.6 will be vulnerable to both CVE-2022-3602 and CVE-2022-3786
## Prerequisite's
- python3
- pip install -r requirements.txt
## Usage
```
usage: openssl_cert_detector.py [-h] [-t TARGET] [-T TARGETS]
optional arguments:
-h, --help show this help message and exit
-t TARGET, --target TARGET
Single IP with port separate by colon. Example: -t 192.168.0.3:3000
-T TARGETS, --targets TARGETS
List of IP and port separate by colon and separated by new line in text file
```
### Example 1:
To check for openssl vulnerability on single ip and port
```
python openssl_cert_detector.py -t 192.168.0.3:3000
```
### Example 2:
To check for openssl vulnerability on list of ip and its port in separated by new line in text file
```
python openssl_cert_detector.py -T check.txt
```
## References
- https://github.com/colmmacc/CVE-2022-3602
- https://github.com/DataDog/security-labs-pocs/tree/main/proof-of-concept-exploits/openssl-punycode-vulnerability
- https://github.com/jfrog/jfrog-openssl-tools
文件快照
[4.0K] /data/pocs/bcbd006ed040e2d54585e856954029961366256d
├── [4.0K] Images
│ ├── [ 18K] openssl-2-1.png
│ ├── [2.9K] openssl-3.png
│ └── [ 10K] openssl.png
├── [2.8K] openssl_cert_detector.py
├── [1.2K] README.md
└── [ 19] requirements.txt
1 directory, 6 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。