xaitax / CVE-2024-6387_Check

CVE-2024-6387_Check is a lightweight, efficient tool designed to identify servers running vulnerable versions of OpenSSH
GNU General Public License v3.0
456 stars 87 forks source link

Ports #35

Closed JinxCH73 closed 3 months ago

JinxCH73 commented 3 months ago

Thanks for the job. Seems to have a problem with specified ports :

python CVE-2024-6387_Check.py -ports 22,22222 -l linux.txt

                                  _________ _________ ___ ___ .__

/ ____// // | || __ _ \ _/ \ / __\ _/ \ ___ \ __ \/ ~ \ |/ \ / \ | | \/\ _// /_/ > | \/\ / / \/ \ Y / ( <> ) | \ || _ > /|| \ > / /_|_ /||__/|_| / \/_____/ \/ \/ \/ \/ \/ CVE-2024-6387 Vulnerability Checker v0.8 / Alex Hagenah / @xaitax / ah@primepage.de

Traceback (most recent call last): File "C:\xxx\CVE-2024-6387_Check-main\CVE-2024-6387_Check-main\CVE-2024-6387_Check.py", line 297, in main() File "C:\xxx\CVE-2024-6387_Check-main\CVE-2024-6387_Check-main\CVE-2024-6387_Check.py", line 208, in main ports = [int(p) for p in args.ports.split(',')] ^^^^^^ ValueError: invalid literal for int() with base 10: 'orts'

xaitax commented 3 months ago

Hi @JinxCH73

sorry, but I cannot reproduce this:

$ python CVE-2024-6387_Check.py -l iplist.txt --ports 22,22222 -d

                                      _________ _________ ___ ___ .__
_______   ____   ___________   ____  /   _____//   _____//   |   \|__| ____   ____
\_  __ \_/ __ \ / ___\_  __ \_/ __ \ \_____  \ \_____  \/    ~    \  |/  _ \ /    \
 |  | \/\  ___// /_/  >  | \/\  ___/ /        \/        \    Y    /  (  <_> )   |  \
 |__|    \___  >___  /|__|    \___  >_______  /_______  /\___|_  /|__|\____/|___|  /
             \/_____/             \/        \/        \/       \/                \/
    CVE-2024-6387 Vulnerability Checker
    v0.8 / Alex Hagenah / @xaitax / ah@primepage.de

Progress: 518/518 checks performed

🛡️ Servers not vulnerable: 3
   [+] Server at xxx (running SSH-2.0-OpenSSH_9.7 FreeBSD-20240701)
   [+] Server at xxx (running SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.11)
   [+] Server at xxx (running SSH-2.0-OpenSSH_9.6p1 Ubuntu-3ubuntu13.4)

🚨 Servers likely vulnerable: 0

⚠️ Servers with unknown SSH version: 1
   [+] Server at xxx (banner: SSH-2.0-ROSSSH)

🔒 Servers with port(s) closed: 514

📊 Total scanned hosts: 259
📊 Total port checks performed: 518
JinxCH73 commented 3 months ago

Indeed... No more problem with a new try... Thanks anyway.