Fixed issues for CVE-2023-33246
parent
5ee040606c
commit
3cda62a31f
|
@ -0,0 +1,38 @@
|
|||
id: CVE-2024-6387
|
||||
|
||||
info:
|
||||
name: regreSSHion - Vulnerable SSH Authentication
|
||||
author: Sumanth Vankineni
|
||||
severity: high
|
||||
description: |
|
||||
The CVE-2024-6387 describes a vulnerability in the SSH service where malformed authentication requests can lead to unauthorized access.
|
||||
remediation: Update to the latest version of SSH to mitigate this vulnerability.
|
||||
reference:
|
||||
- https://example.com/cve-2024-6387
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2024-6387
|
||||
classification:
|
||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
||||
cvss-score: 9.8
|
||||
cve-id: CVE-2024-6387
|
||||
cwe-id: CWE-287
|
||||
epss-score: 0.05
|
||||
epss-percentile: 0.95
|
||||
cpe: cpe:2.3:a:ssh:ssh:8.5:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
vendor: ssh
|
||||
product: ssh
|
||||
tags: network,cve2024,cve,ssh,openssh,tcp
|
||||
|
||||
tcp:
|
||||
- host:
|
||||
- "{{Hostname}}"
|
||||
port: 22
|
||||
inputs:
|
||||
- data: "SSH-2.0-ExampleClientStaticTest"
|
||||
matchers:
|
||||
- type: regex
|
||||
regex:
|
||||
- "SSH-2\\.0-OpenSSH_8\\.[5-9]"
|
||||
- "SSH-2\\.0-OpenSSH_9\\.[0-7]"
|
||||
part: data
|
Loading…
Reference in New Issue