45 lines
1.3 KiB
YAML
45 lines
1.3 KiB
YAML
id: ssh-weak-mac-algo
|
|
|
|
info:
|
|
name: SSH Weak MAC Algorithms Enabled
|
|
author: pussycat0x
|
|
severity: low
|
|
description: |
|
|
The system's SSH configuration poses a security risk by allowing weak Message Authentication Code (MAC) algorithms, potentially exposing it to vulnerabilities and unauthorized access. It is crucial to update and strengthen the MAC algorithms for enhanced security.
|
|
reference:
|
|
- https://www.tenable.com/plugins/nessus/71049
|
|
metadata:
|
|
verified: true
|
|
max-request: 1
|
|
shodan-query: product:"OpenSSH"
|
|
tags: javascript,ssh,misconfig,network
|
|
javascript:
|
|
- code: |
|
|
let m = require("nuclei/ssh");
|
|
let c = m.SSHClient();
|
|
let response = c.ConnectSSHInfoMode(Host, Port);
|
|
to_json(response);
|
|
args:
|
|
Host: "{{Host}}"
|
|
Port: "22"
|
|
|
|
matchers-condition: and
|
|
matchers:
|
|
- type: word
|
|
words:
|
|
- "server_to_client_macs"
|
|
- "client_to_server_macs"
|
|
condition: and
|
|
|
|
- type: word
|
|
words:
|
|
- "hmac-md5"
|
|
- "hmac-md5-96"
|
|
- "hmac-sha1-96"
|
|
- "hmac-md5"
|
|
- "hmac-md5-96"
|
|
- "hmac-sha1-96"
|
|
condition: or
|
|
|
|
# digest: 4b0a004830460221009d4af93ce2518a2f1ba34c1a9e32f88ad1c5fb56f9e72aa2bad175264387341a022100fc316a92c6f71c3594e0c50bd29d744604b5c6661c1f7332f4a07d04525e3cd6:922c64590222798bb761d5b6d8e72950
|