Skip to content

kuffsit/check_cve_2024_6387

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

13 Commits
 
 
 
 

Repository files navigation

check_cve_2024_6387

🔥 CVE-2024-6387 RCE

Description

This script checks if a given IP or list of IPs is running a version of OpenSSH that is vulnerable to CVE-2024-6387.

Usage

Single IP Check

To check a single IP, run the script with the IP address and port as arguments.

python3 check_cve_2024_6387.py <ip> <port>

Example:

python3 check_cve_2024_6387.py 192.168.1.1 22

Multiple IPs Check To check multiple IPs, provide a file containing a list of IP addresses (one per line) as the first argument, and the port as the second argument.

python3 check_cve_2024_6387.py <file> <port>

Example:

python3 check_cve_2024_6387.py ip_list.txt 22

Notes The script sends an SSH version string to the specified IP and port. It then checks the server response for known vulnerable OpenSSH versions. If a vulnerable version is found, the script prints a message indicating that the server is likely vulnerable to CVE-2024-6387.

Dependencies Python 3.x Example Output

python3 check_cve_2024_6387.py 192.168.1.1 22
[+] Server at 192.168.1.1:22 is running a vulnerable version of OpenSSH
[+] Server at 192.168.1.1:22 is likely vulnerable to CVE-2024-6387.

python3 check_cve_2024_6387.py ip_list.txt 22
[-] Server at 192.168.1.2:22 is not running a vulnerable version of OpenSSH
[+] Server at 192.168.1.3:22 is running a vulnerable version of OpenSSH
[+] Server at 192.168.1.3:22 is likely vulnerable to CVE-2024-6387.

This setup ensures that you can check both single and multiple IPs for the vulnerability in a straightforward manner.

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages