F5 load balancers vulnerable to libssh auth bypass CVE-2018-10933 https://support.f5.com/csp/article/K52868493 … - carnage begins.
-
-
I’ve been trying for a while. I get a channel opened successfully for either a shell or an exec command from the ssh server with the auth bypass but nothing interactive or command exec works serverside and paramiko just goes belly-up.
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
I do not think this can spawn a shell, the channel is being denied on the server side code that I have tested. It can be used to create communication channels without authentication however. My patch makes every authentication bypass through the packet handler.
-
That's been the consensus of the Metasploit team as well. RCE is possible, but requires additional missteps by the target application. Note the sample patch showing how it could happen.https://github.com/rapid7/metasploit-framework/pull/10820 …
- 3 more replies
New conversation -
-
-
There’s no ability to spawn a shell.
- End of conversation
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.