Overview
This Python script is designed to check SSH servers for the CVE-2024-6387 vulnerability, specifically targeting the recently discovered regreSSHion, which is associated with specific versions of OpenSSH. The tool supports multiple IP addresses, URLs, CIDR ranges, and ports, and can also read addresses from a file. The results are displayed in a categorized and color-coded manner for better readability.
Features
- Customizable:
Specify multiple IP addresses, URLs, CIDR ranges, and ports. - File Input Support:
Read addresses and ranges from a file. - Color-Coded Output:
Easily distinguish between vulnerable, safe, unknown, and error results. - Network Range Handling:
Automatically expands CIDR ranges into individual IP addresses.
Output
- SAFE:
Non-vulnerable servers. - VULNERABLE:
Servers running a vulnerable version of OpenSSH. - UNKNOWN:
Servers with an unknown SSH version. - ERROR:
Servers that could not be accessed or resolved.
Command Line
To run the script with multiple IPs, URLs, or CIDR ranges directly from the command line:
python3 CVE-2024-6387-Vulnerability-Checker.py <addresses> -p <ports> -t <timeout>
Code language: HTML, XML
For those of you that dont know where to get the checker, you can clone it here.
https://github.com/filipi86/CVE-2024-6387-Vulnerability-Checker/