2021-08-21 11:55:11 +00:00
id : CVE-2018-15473
info :
2021-11-01 18:34:47 +00:00
name : OpenSSH Username Enumeration <= v7.7
author : r3dg33k,daffainfo,forgedhallpass
2021-09-10 11:26:40 +00:00
severity : medium
2022-04-22 10:38:41 +00:00
description : OpenSSH through 7.7 is prone to a user enumeration vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed,
related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c.
reference :
- https://nvd.nist.gov/vuln/detail/CVE-2018-15473
2021-09-10 11:26:40 +00:00
classification :
cvss-metrics : CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
2022-04-22 10:38:41 +00:00
cvss-score : 5.3
2021-09-10 11:26:40 +00:00
cve-id : CVE-2018-15473
cwe-id : CWE-362
2022-01-07 07:28:37 +00:00
tags : network,openssh,cve,cve2018
2021-08-21 11:55:11 +00:00
network :
- host :
- "{{Hostname}}"
2022-01-07 07:28:37 +00:00
- "{{Host}}:22"
2021-08-21 11:55:11 +00:00
matchers :
- type : regex
regex :
2021-11-01 18:34:47 +00:00
- '(?i)SSH-2.0-OpenSSH_(?:[1-6][^\d][^\r]+|7\.[0-7][^\d][^\r]+)'
2021-10-30 13:56:12 +00:00
extractors :
- type : regex
regex :
2021-11-01 18:34:47 +00:00
- '(?i)SSH-2.0-OpenSSH_[^\r]+'