github
WRITEUP
3,480 stars
by qazbnm456 · poc
https://github.com/qazbnm456/awesome-cve-poc/tree/master/CVE-2018-10933.md
This repository provides references and analysis links for CVE-2018-10933, an authentication bypass vulnerability in libSSH. It does not contain exploit code but points to external resources and PoCs.
Classification
Writeup 90%
Target:
libSSH (versions before 0.8.4 and 0.7.6)
No auth needed
Prerequisites:
Network access to a vulnerable libSSH server
nomisec
WORKING POC
498 stars
by blacknbunny · poc
https://github.com/blacknbunny/CVE-2018-10933
This repository contains a functional PoC for CVE-2018-10933, an authentication bypass vulnerability in libSSH. The exploit leverages a flaw in the SSH protocol implementation to execute commands without credentials.
Classification
Working Poc 95%
Target:
libSSH versions 0.6.x to 0.7.5
No auth needed
Prerequisites:
Network access to a vulnerable libSSH server · Python with paramiko library
nomisec
SCANNER
232 stars
by jobroche · poc
https://github.com/jobroche/libssh-scanner
This is a Python-based scanner for CVE-2018-10933, an authentication bypass vulnerability in libssh versions 0.6+. It supports passive (banner grabbing) and aggressive (authentication bypass) modes to identify vulnerable hosts.
Classification
Scanner 100%
Target:
libssh versions 0.6 to 0.7.5 and 0.8 to 0.8.3
No auth needed
Prerequisites:
Network access to the target SSH service · Python 2.x with paramiko and six libraries
nomisec
WORKING POC
126 stars
by SoledaD208 · poc
https://github.com/SoledaD208/CVE-2018-10933
This PoC exploits CVE-2018-10933, an authentication bypass vulnerability in libssh. It sends a crafted SSH message to bypass authentication and spawn a shell without credentials.
Classification
Working Poc 95%
Target:
libssh versions prior to 0.7.6 and 0.8.4
No auth needed
Prerequisites:
Network access to the target SSH service · Vulnerable version of libssh running on the target
nomisec
WORKING POC
109 stars
by hackerhouse-opensource · poc
https://github.com/hackerhouse-opensource/cve-2018-10933
This repository provides a working proof-of-concept for CVE-2018-10933, an authentication bypass vulnerability in libssh. It includes a patched libssh client and a vulnerable Docker container for testing the exploit.
Classification
Working Poc 100%
Target:
libssh 0.8.3 and earlier
No auth needed
Prerequisites:
Access to a vulnerable libssh server
nomisec
WORKING POC
21 stars
by jas502n · poc
https://github.com/jas502n/CVE-2018-10933
This PoC exploits CVE-2018-10933, an authentication bypass vulnerability in libssh. It sends a MSG_USERAUTH_SUCCESS message before authentication, allowing unauthorized access to the SSH server.
Classification
Working Poc 95%
Target:
libssh (versions before 0.8.4 and 0.7.6)
No auth needed
Prerequisites:
Network access to the target SSH server · libssh server with vulnerable version
github
WRITEUP
14 stars
by xbl3 · poc
https://github.com/xbl3/awesome-cve-poc_qazbnm456/tree/master/CVE-2018-10933.md
This repository provides references and analysis links for CVE-2018-10933, an authentication bypass vulnerability in libSSH. It does not contain exploit code but points to external resources and PoCs.
Classification
Writeup 90%
Target:
libSSH (versions prior to 0.8.4 and 0.7.6)
No auth needed
Prerequisites:
Network access to a vulnerable libSSH server
nomisec
WORKING POC
14 stars
by kn6869610 · poc
https://github.com/kn6869610/CVE-2018-10933
This PoC exploits CVE-2018-10933, an authentication bypass vulnerability in libssh, by sending a MSG_USERAUTH_SUCCESS message to bypass authentication and open a shell channel. It uses Paramiko to interact with the SSH server.
Classification
Working Poc 90%
Target:
libssh versions 0.6 and above
No auth needed
Prerequisites:
Network access to the target SSH server · libssh server with vulnerable version
nomisec
WORKING POC
11 stars
by Virgula0 · poc
https://github.com/Virgula0/POC-CVE-2018-10933
This PoC exploits CVE-2018-10933, an authentication bypass vulnerability in LibSSH, by sending a crafted SSH message to execute arbitrary commands on the target system. It checks the banner to confirm vulnerability and then establishes an interactive shell.
Classification
Working Poc 95%
Target:
LibSSH versions 0.6.x, 0.7.x (<0.7.6), and 0.8.x (<0.8.4)
No auth needed
Prerequisites:
Network access to the target SSH service · LibSSH service running on the target
nomisec
SCANNER
10 stars
by marco-lancini · poc
https://github.com/marco-lancini/hunt-for-cve-2018-10933
This repository provides scripts to scan for hosts vulnerable to CVE-2018-10933, a libSSH authentication bypass vulnerability. It includes tools for scanning and identifying vulnerable systems but does not contain a direct exploit payload.
Classification
Scanner 90%
Target:
libSSH versions 0.6 and above
No auth needed
Prerequisites:
List of target IPs or hosts · Nmap installed
nomisec
WORKING POC
6 stars
by nikhil1232 · poc
https://github.com/nikhil1232/LibSSH-Authentication-Bypass
This PoC exploits CVE-2018-10933, an authentication bypass vulnerability in LibSSH, by sending a crafted SSH message to bypass authentication and execute arbitrary commands on the target system. It uses Paramiko to establish a connection and directly injects a success message to achieve RCE.
Classification
Working Poc 95%
Target:
LibSSH versions 0.6 and above
No auth needed
Prerequisites:
Network access to the target LibSSH service · LibSSH service running on the target
nomisec
WORKING POC
4 stars
by HSw109 · poc
https://github.com/HSw109/CVE-2018-10933
This repository contains a working PoC for CVE-2018-10933, an authentication bypass vulnerability in libSSH versions 0.6 and above. The exploit sends an SSH2_MSG_USERAUTH_SUCCESS message to bypass authentication and gain shell access.
Classification
Working Poc 95%
Target:
libSSH versions 0.6 to 0.8.3
No auth needed
Prerequisites:
Vulnerable libSSH server · Network access to the target
nomisec
WORKING POC
3 stars
by xFreed0m · poc
https://github.com/xFreed0m/CVE-2018-10933
This PoC exploits CVE-2018-10933, an authentication bypass vulnerability in libssh, by sending an SSH2_MSG_USERAUTH_SUCCESS message to execute arbitrary commands on vulnerable servers. It includes both scanning and exploitation modules.
Classification
Working Poc 95%
Target:
libssh versions 0.7.6 and 0.8.4
No auth needed
Prerequisites:
Network access to the target SSH service · Vulnerable libssh version running on the target
nomisec
WORKING POC
2 stars
by shifa123 · poc
https://github.com/shifa123/pythonprojects-CVE-2018-10933
This Python script exploits CVE-2018-10933, a vulnerability in libssh that allows authentication bypass. It uses the paramiko library to send a crafted message to the target, enabling remote command execution without proper authentication.
Classification
Working Poc 95%
Target:
libssh versions before 0.8.4 and 0.7.6
No auth needed
Prerequisites:
Target must be running a vulnerable version of libssh · Network access to the target's SSH port
nomisec
WORKING POC
1 stars
by Rubikcuv5 · poc
https://github.com/Rubikcuv5/CVE-2018-10933
This repository contains a functional exploit for CVE-2018-10933, an authentication bypass vulnerability in libssh. The exploit leverages the flawed state machine in libssh to execute commands on a vulnerable server without authentication.
Classification
Working Poc 95%
Target:
libssh versions before 0.7.6 and 0.8.4
No auth needed
Prerequisites:
Network access to the target SSH server · Vulnerable libssh version on the target
nomisec
SCANNER
1 stars
by ivanacostarubio · poc
https://github.com/ivanacostarubio/libssh-scanner
This repository contains a scanner for CVE-2018-10933, which checks for vulnerable libssh versions by analyzing the SSH banner. It does not exploit the vulnerability but identifies potentially vulnerable servers.
Classification
Scanner 100%
Target:
libssh versions 0.6.x, 0.7.x < 0.7.6, and 0.8.x < 0.8.4
No auth needed
Prerequisites:
Network access to the target SSH server
nomisec
WORKING POC
1 stars
by likekabin · poc
https://github.com/likekabin/CVE-2018-10933-libSSH-Authentication-Bypass
This repository contains two Python scripts demonstrating CVE-2018-10933, an authentication bypass vulnerability in libSSH versions 0.6 and above. The scripts exploit the flaw by manipulating SSH message handling to bypass authentication and execute commands or spawn a shell.
Classification
Working Poc 100%
Target:
libSSH versions 0.6 and above (prior to 0.8.4 and 0.7.6)
No auth needed
Prerequisites:
Vulnerable libSSH server · Network access to the target server
nomisec
WORKING POC
1 stars
by r3dxpl0it · poc
https://github.com/r3dxpl0it/CVE-2018-10933
This PoC exploits CVE-2018-10933, an authentication bypass vulnerability in libssh server implementations before versions 0.7.6 and 0.8.4. It leverages the flawed state machine to execute commands on the target without authentication by sending a crafted SSH message.
Classification
Working Poc 95%
Target:
libssh (versions before 0.7.6 and 0.8.4)
No auth needed
Prerequisites:
Network access to the target libssh server · Python 3 with paramiko library
nomisec
WORKING POC
by likekabin · poc
https://github.com/likekabin/CVE-2018-10933_ssh
This PoC exploits CVE-2018-10933, an authentication bypass vulnerability in libssh, by sending a crafted SSH message to bypass authentication and spawn a shell without credentials. It uses Paramiko to manipulate the SSH protocol and directly invoke a shell session.
Classification
Working Poc 100%
Target:
libssh versions 0.6 and above, specifically tested on 0.7.4
No auth needed
Prerequisites:
Vulnerable version of libssh running an SSH server · Network access to the target SSH port
nomisec
WORKING POC
by SilasSpringer · poc
https://github.com/SilasSpringer/CVE-2018-10933
This repository contains a functional proof-of-concept exploit for CVE-2018-10933, an authentication bypass vulnerability in libSSH. The exploit sends a crafted packet with the MSG_USERAUTH_SUCCESS byte to bypass authentication and execute arbitrary commands on the target system.
Classification
Working Poc 100%
Target:
libSSH versions 0.6 and above, prior to 0.8.4 and 0.7.6
No auth needed
Prerequisites:
Network access to the target system's SSH port · Vulnerable version of libSSH running on the target
nomisec
WORKING POC
by ninp0 · poc
https://github.com/ninp0/cve-2018-10933_poc
This repository contains a proof-of-concept exploit for CVE-2018-10933, an authentication bypass vulnerability in libssh 0.7.4. The exploit demonstrates how to bypass authentication by leveraging a flaw in the server's state machine.
Classification
Working Poc 90%
Target:
libssh 0.7.4
No auth needed
Prerequisites:
Access to a vulnerable libssh server
nomisec
WORKING POC
by bidaoui4905 · poc
https://github.com/bidaoui4905/CVE-2018-10933
This PoC exploits CVE-2018-10933, an authentication bypass in libssh, by sending a SSH2_MSG_USERAUTH_SUCCESS message without prior authentication. It then executes a command (ifconfig -a) to demonstrate unauthorized access.
Classification
Working Poc 95%
Target:
libssh 0.6 and above (fixed in 0.7.6 and 0.8.4)
No auth needed
Prerequisites:
Target server running vulnerable libssh version · Network access to the target's SSH port (22)
nomisec
WORKING POC
by Bifrozt · poc
https://github.com/Bifrozt/CVE-2018-10933
This PoC exploits CVE-2018-10933, an authentication bypass vulnerability in libssh. It sends a crafted SSH message to bypass authentication and execute arbitrary commands on the target system.
Classification
Working Poc 95%
Target:
libssh versions 0.6 and above
No auth needed
Prerequisites:
Network access to the target SSH port · libssh version vulnerable to CVE-2018-10933
nomisec
WORKING POC
by crispy-peppers · poc
https://github.com/crispy-peppers/Libssh-server-CVE-2018-10933
This exploit leverages CVE-2018-10933, an authentication bypass vulnerability in libssh, by sending a crafted SSH message to execute arbitrary commands on the target server without authentication.
Classification
Working Poc 95%
Target:
libssh versions 0.6 and above
No auth needed
Prerequisites:
Network access to the target SSH server · Target server running a vulnerable version of libssh
nomisec
WRITEUP
by hook-s3c · poc
https://github.com/hook-s3c/CVE-2018-10933
This repository contains a README describing a Docker lab for testing and exploiting CVE-2018-10933, an SSH library user authentication bypass vulnerability. No actual exploit code or technical details are provided in the snippet.
Classification
Writeup 30%
Target:
libssh versions before 0.8.4 and 0.7.6
No auth needed
Prerequisites:
Docker environment · Vulnerable libssh version
nomisec
WORKING POC
by opsifiz · poc
https://github.com/opsifiz/CVE-2018-10933
This exploit bypasses authentication in libssh versions 0.6 and above by sending a fake SSH_USERAUTH_SUCCESS message, allowing an attacker to gain an interactive shell without credentials. It uses Paramiko to manipulate the SSH protocol handshake.
Classification
Working Poc 100%
Target:
libssh 0.6 and above
No auth needed
Prerequisites:
Network access to the target SSH service · libssh version 0.6 or later on the target
nomisec
SCANNER
by pghook · poc
https://github.com/pghook/CVE-2018-10933_Scanner
This repository contains a Python-based scanner for detecting libssh servers vulnerable to CVE-2018-10933 by checking the banner version. It supports single targets or a list of targets and includes geolocation lookup for vulnerable hosts.
Classification
Scanner 100%
Target:
libssh 0.6.0
No auth needed
Prerequisites:
Network access to the target libssh server
nomisec
WORKING POC
by cyberharsh · poc
https://github.com/cyberharsh/Libssh-server-CVE-2018-10933
This repository contains a working proof-of-concept exploit for CVE-2018-10933, an authentication bypass vulnerability in libssh. The exploit leverages a logic flaw in the server-side state machine by sending a `MSG_USERAUTH_SUCCESS` message before authentication, allowing arbitrary command execution on vulnerable servers.
Classification
Working Poc 100%
Target:
libssh (versions prior to 0.8.4 and 0.7.6)
No auth needed
Prerequisites:
Network access to the target SSH server · Vulnerable version of libssh running on the target
nomisec
WORKING POC
by sambiyal · poc
https://github.com/sambiyal/CVE-2018-10933-POC
This PoC exploits CVE-2018-10933, an authentication bypass vulnerability in libssh versions before 0.7.6 and 0.8.4. It leverages a flaw in the server-side state machine to bypass authentication and execute a command (id) on the target system.
Classification
Working Poc 95%
Target:
libssh < 0.7.6, < 0.8.4
No auth needed
Prerequisites:
Network access to target SSH server · libssh server vulnerable to CVE-2018-10933
nomisec
WORKING POC
by youkergav · poc
https://github.com/youkergav/CVE-2018-10933
This PoC exploits CVE-2018-10933, an authentication bypass in libssh server code by sending an SSH2_MSG_USERAUTH_SUCCESS message instead of the expected SSH2_MSG_USERAUTH_REQUEST, allowing unauthenticated command execution.
Classification
Working Poc 95%
Target:
libssh versions 0.6 to 0.8.4
No auth needed
Prerequisites:
Network access to vulnerable libssh server · Python with paramiko library
nomisec
WRITEUP
by cve-2018 · poc
https://github.com/cve-2018/cve-2018-10933
The repository contains a README.md file describing CVE-2018-10933, an authentication bypass vulnerability in libssh, and mentions Docker containers vulnerable on port 2222. No exploit code or technical details are provided.
Classification
Writeup 30%
Target:
libssh (versions prior to 0.8.4, 0.7.6)
No auth needed
Prerequisites:
Vulnerable libssh version · Exposed SSH service (e.g., Docker container on port 2222)
nomisec
WORKING POC
by 0xadaw · poc
https://github.com/0xadaw/libSSH-bypass
This repository contains a PoC for CVE-2018-10933, an authentication bypass vulnerability in libSSH. It includes scripts to exploit the vulnerability, scan for vulnerable servers, and verify the presence of the vulnerable libSSH version.
Classification
Working Poc 90%
Target:
libSSH versions 0.6 and below
No auth needed
Prerequisites:
Network access to the target SSH server · Python with paramiko library installed
nomisec
WORKING POC
by ensimag-security · poc
https://github.com/ensimag-security/CVE-2018-10933
This repository contains a working PoC for CVE-2018-10933, an authentication bypass vulnerability in libSSH. The exploit leverages a flaw in the SSH protocol implementation to bypass authentication and execute arbitrary commands on the target system.
Classification
Working Poc 95%
Target:
libSSH versions 0.6.0 to 0.7.5 and 0.8.0 to 0.8.3
No auth needed
Prerequisites:
Network access to the target system · libSSH vulnerable version running on the target
nomisec
SCANNER
by reanimat0r · poc
https://github.com/reanimat0r/bpnd-libssh
This repository contains a multi-threaded remote scanner for CVE-2018-10933, an authentication bypass vulnerability in libssh. It uses Python3 and the Paramiko module to scan for vulnerable instances.
Classification
Scanner 90%
Target:
libssh versions 0.6 and above, prior to 0.7.6 and 0.8.4
No auth needed
Prerequisites:
Python3 · Paramiko module · Network access to target systems
nomisec
WORKING POC
by Kurlee · poc
https://github.com/Kurlee/LibSSH-exploit
This PoC exploits CVE-2018-10933, an authentication bypass vulnerability in libssh versions before 0.8.4. It sends a cMSG_USERAUTH_SUCCESS message to bypass authentication and execute arbitrary commands on the vulnerable server.
Classification
Working Poc 95%
Target:
libssh before 0.8.4
No auth needed
Prerequisites:
Network access to the vulnerable libssh server · Python environment with paramiko library
nomisec
WORKING POC
by kristyna-mlcakova · poc
https://github.com/kristyna-mlcakova/CVE-2018-10933
This PoC exploits CVE-2018-10933, an authentication bypass vulnerability in libSSH, by sending a crafted SSH message to bypass authentication and execute arbitrary commands on the target server.
Classification
Working Poc 95%
Target:
libSSH versions 0.6 and above
No auth needed
Prerequisites:
Network access to the target SSH server · libSSH server vulnerable to CVE-2018-10933
nomisec
SCANNER
by JoSecMx · poc
https://github.com/JoSecMx/CVE-2018-10933_Scanner
This repository contains a Python-based scanner for detecting libssh servers vulnerable to CVE-2018-10933. It checks for the presence of version 0.6.0 in the SSH banner and optionally performs geolocation of vulnerable targets.
Classification
Scanner 100%
Target:
libssh 0.6.0
No auth needed
Prerequisites:
Network access to the target SSH port (default: 22)
nomisec
WORKING POC
by Remnant-DB · poc
https://github.com/Remnant-DB/CVE-2018-10933
This repository provides a containerized lab environment demonstrating CVE-2018-10933, an authentication bypass vulnerability in libssh. It includes a custom server implementation that forces reliance on the auth-bypass mechanism, allowing unauthenticated command execution.
Classification
Working Poc 95%
Target:
libssh 0.8.3
No auth needed
Prerequisites:
Docker or Podman · network access to the exposed port
exploitdb
WORKING POC
by Dayanç Soyadlı · pythonremotelinux
https://www.exploit-db.com/exploits/45638
This exploit bypasses authentication in libSSH by sending a cMSG_USERAUTH_SUCCESS message without credentials, allowing an attacker to gain shell access. It leverages a vulnerability in the SSH protocol implementation.
Classification
Working Poc 95%
Target:
libSSH versions 0.6 and above
No auth needed
Prerequisites:
Network access to the target SSH service · libSSH service running on the target
exploitdb
WORKING POC
VERIFIED
by jas502n · pythonremotelinux
https://www.exploit-db.com/exploits/46307
This exploit leverages a vulnerability in libssh (CVE-2018-10933) where the server incorrectly handles SSH2_MSG_USERAUTH_SUCCESS messages, allowing authentication bypass. It executes arbitrary commands on the target system by bypassing authentication and opening an SSH session.
Classification
Working Poc 95%
Target:
libssh versions 0.6 and above
No auth needed
Prerequisites:
Network access to the target SSH server · libssh server with vulnerable version
metasploit
WORKING POC
by Peter Winter-Smith, wvu · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/ssh/libssh_auth_bypass.rb
This Metasploit module exploits CVE-2018-10933, an authentication bypass in libssh servers by sending a USERAUTH_SUCCESS message instead of USERAUTH_REQUEST. It supports both shell spawning and command execution actions.
Classification
Working Poc 95%
Target:
libssh versions 0.6.0-0.7.5 and 0.8.0-0.8.3
No auth needed
Prerequisites:
Network access to vulnerable libssh server · SSH port (default 22) open