- https://www.exploit-db.com/exploits/46193/
- https://gist.github.com/mehaase/63e45c17bdbbd59e8e68d02ec58f4ca2
- Ubuntu 20.04 LTS
- OpenSSH 7.9
- Server
docker run --rm -p 5555:5555 -it simaofsilva/cve-2019-6111
- Client
docker run --rm -it simaofsilva/cve-2019-6111-client
scp -P 5555 {USER}@{IP}:{FILE} .
The result of ls -a
will show the file requested FILE with his content adulterated and another called exploit.txt
.
The FILE must be in the home directory of USER.