OpenSSH 4.3
Nmap enumerated the version information of the SSH
server on the target port 80
┌──(kali㉿kali)-[~/archive/htb/labs/beep]
└─$ searchsploit OpenSSH 4.3
-------------------------------------------------------------------------- ---------------------------------
Exploit Title | Path
-------------------------------------------------------------------------- ---------------------------------
OpenSSH 2.3 < 7.7 - Username Enumeration | linux/remote/45233.py
OpenSSH 2.3 < 7.7 - Username Enumeration (PoC) | linux/remote/45210.py
OpenSSH 4.3 p1 - Duplicated Block Remote Denial of Service | multiple/dos/2444.sh
OpenSSH < 6.6 SFTP (x64) - Command Execution | linux_x86-64/remote/45000.c
OpenSSH < 6.6 SFTP - Command Execution | linux/remote/45001.py
OpenSSH < 7.4 - 'UsePrivilegeSeparation Disabled' Forwarded Unix Domain S | linux/local/40962.txt
OpenSSH < 7.4 - agent Protocol Arbitrary Library Loading | linux/remote/40963.txt
OpenSSH < 7.7 - User Enumeration (2) | linux/remote/45939.py
-------------------------------------------------------------------------- ---------------------------------
shellcodes: No Results
papers: No Results
While OpenSSH 4.3
appears to have multiple vulnerabilities, those scripts from the searchsploit
search result untested to be reliable
cvedetails also listed the vulnerabilities that
OpenSSH 4.3
suffer