{"uuid": "9dbc3a66-9968-4c06-874f-ec380a493434", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6387", "type": "published-proof-of-concept", "source": "https://t.me/pt_soft/330", "content": "\ud83d\udd11 RegreSSHion \u2014 OpenSSH Unauthenticated RCE\n\nRace condition unauthenticated RCE \u0432 OpenSSH\u2019s \u0441\u0435\u0440\u0432\u0435\u0440 (sshd) \n\nCVE-2024-6387\n\n\ud83d\udd20 \u0420\u0430\u0437\u0431\u043e\u0440: \nhttps://blog.qualys.com/vulnerabilities-threat-research/2024/07/01/regresshion-remote-unauthenticated-code-execution-vulnerability-in-openssh-server\n\n\ud83d\udd20 Checker:\nhttps://github.com/xaitax/CVE-2024-6387_Check\n\npython3 CVE-2024-6387_Check.py 192.168.1.1 example.com --port 2222\n\nPoC \u0432 \u0431\u043e\u0442\u0435:\n\n!poc CVE-2024-6387\n\n#openssh #glibc #rce #cve\n\n\u2708\ufe0f // Pentest HaT \ud83c\udfa9", "creation_timestamp": "2024-07-02T11:53:35.000000Z"}