mirror of
https://github.com/jtesta/ssh-audit.git
synced 2024-11-16 13:35:39 +01:00
276 lines
7.7 KiB
JSON
276 lines
7.7 KiB
JSON
{
|
|
"banner": {
|
|
"comments": null,
|
|
"protocol": [
|
|
2,
|
|
0
|
|
],
|
|
"raw": "SSH-2.0-OpenSSH_5.6",
|
|
"software": "OpenSSH_5.6"
|
|
},
|
|
"compression": [
|
|
"none",
|
|
"zlib@openssh.com"
|
|
],
|
|
"cves": [
|
|
{
|
|
"cvssv2": 7.8,
|
|
"description": "command injection via anomalous argument transfers",
|
|
"name": "CVE-2020-15778"
|
|
},
|
|
{
|
|
"cvssv2": 5.3,
|
|
"description": "enumerate usernames due to timing discrepancies",
|
|
"name": "CVE-2018-15473"
|
|
},
|
|
{
|
|
"cvssv2": 5.3,
|
|
"description": "readonly bypass via sftp",
|
|
"name": "CVE-2017-15906"
|
|
},
|
|
{
|
|
"cvssv2": 5.3,
|
|
"description": "enumerate usernames via challenge response",
|
|
"name": "CVE-2016-20012"
|
|
},
|
|
{
|
|
"cvssv2": 5.5,
|
|
"description": "bypass command restrictions via crafted X11 forwarding data",
|
|
"name": "CVE-2016-3115"
|
|
},
|
|
{
|
|
"cvssv2": 5.0,
|
|
"description": "cause DoS via crafted network traffic (out of bounds read)",
|
|
"name": "CVE-2016-1907"
|
|
},
|
|
{
|
|
"cvssv2": 6.9,
|
|
"description": "privilege escalation via leveraging sshd uid",
|
|
"name": "CVE-2015-6564"
|
|
},
|
|
{
|
|
"cvssv2": 1.9,
|
|
"description": "conduct impersonation attack",
|
|
"name": "CVE-2015-6563"
|
|
},
|
|
{
|
|
"cvssv2": 5.8,
|
|
"description": "bypass environment restrictions via specific string before wildcard",
|
|
"name": "CVE-2014-2532"
|
|
},
|
|
{
|
|
"cvssv2": 7.5,
|
|
"description": "cause DoS via triggering error condition (memory corruption)",
|
|
"name": "CVE-2014-1692"
|
|
},
|
|
{
|
|
"cvssv2": 3.5,
|
|
"description": "leak data via debug messages",
|
|
"name": "CVE-2012-0814"
|
|
},
|
|
{
|
|
"cvssv2": 3.5,
|
|
"description": "cause DoS via large value in certain length field (memory consumption)",
|
|
"name": "CVE-2011-5000"
|
|
},
|
|
{
|
|
"cvssv2": 5.0,
|
|
"description": "cause DoS via large number of connections (slot exhaustion)",
|
|
"name": "CVE-2010-5107"
|
|
},
|
|
{
|
|
"cvssv2": 4.0,
|
|
"description": "cause DoS via crafted glob expression (CPU and memory consumption)",
|
|
"name": "CVE-2010-4755"
|
|
},
|
|
{
|
|
"cvssv2": 7.5,
|
|
"description": "bypass authentication check via crafted values",
|
|
"name": "CVE-2010-4478"
|
|
}
|
|
],
|
|
"enc": [
|
|
"aes128-ctr",
|
|
"aes192-ctr",
|
|
"aes256-ctr",
|
|
"arcfour256",
|
|
"arcfour128",
|
|
"aes128-cbc",
|
|
"3des-cbc",
|
|
"blowfish-cbc",
|
|
"cast128-cbc",
|
|
"aes192-cbc",
|
|
"aes256-cbc",
|
|
"arcfour",
|
|
"rijndael-cbc@lysator.liu.se"
|
|
],
|
|
"fingerprints": [
|
|
{
|
|
"hash": "nsWtdJ9Z67Vrf7OsUzQov7esXhsWAfVppArGh25u244",
|
|
"hash_alg": "SHA256",
|
|
"hostkey": "ssh-rsa"
|
|
},
|
|
{
|
|
"hash": "18:e2:51:fe:21:6c:78:d0:b8:cf:32:d4:bd:56:42:e1",
|
|
"hash_alg": "MD5",
|
|
"hostkey": "ssh-rsa"
|
|
}
|
|
],
|
|
"kex": [
|
|
{
|
|
"algorithm": "diffie-hellman-group-exchange-sha256",
|
|
"keysize": 1024
|
|
},
|
|
{
|
|
"algorithm": "diffie-hellman-group-exchange-sha1",
|
|
"keysize": 1024
|
|
},
|
|
{
|
|
"algorithm": "diffie-hellman-group14-sha1"
|
|
},
|
|
{
|
|
"algorithm": "diffie-hellman-group1-sha1"
|
|
}
|
|
],
|
|
"key": [
|
|
{
|
|
"algorithm": "ssh-rsa",
|
|
"keysize": 3072
|
|
},
|
|
{
|
|
"algorithm": "ssh-rsa-cert-v01@openssh.com",
|
|
"ca_algorithm": "ssh-rsa",
|
|
"casize": 3072,
|
|
"keysize": 3072
|
|
}
|
|
],
|
|
"mac": [
|
|
"hmac-md5",
|
|
"hmac-sha1",
|
|
"umac-64@openssh.com",
|
|
"hmac-ripemd160",
|
|
"hmac-ripemd160@openssh.com",
|
|
"hmac-sha1-96",
|
|
"hmac-md5-96"
|
|
],
|
|
"recommendations": {
|
|
"critical": {
|
|
"chg": {
|
|
"kex": [
|
|
{
|
|
"name": "diffie-hellman-group-exchange-sha256",
|
|
"notes": "increase modulus size to 3072 bits or larger"
|
|
}
|
|
]
|
|
},
|
|
"del": {
|
|
"enc": [
|
|
{
|
|
"name": "3des-cbc",
|
|
"notes": ""
|
|
},
|
|
{
|
|
"name": "arcfour128",
|
|
"notes": ""
|
|
},
|
|
{
|
|
"name": "arcfour",
|
|
"notes": ""
|
|
},
|
|
{
|
|
"name": "arcfour256",
|
|
"notes": ""
|
|
},
|
|
{
|
|
"name": "blowfish-cbc",
|
|
"notes": ""
|
|
},
|
|
{
|
|
"name": "cast128-cbc",
|
|
"notes": ""
|
|
},
|
|
{
|
|
"name": "rijndael-cbc@lysator.liu.se",
|
|
"notes": ""
|
|
}
|
|
],
|
|
"kex": [
|
|
{
|
|
"name": "diffie-hellman-group14-sha1",
|
|
"notes": ""
|
|
},
|
|
{
|
|
"name": "diffie-hellman-group1-sha1",
|
|
"notes": ""
|
|
},
|
|
{
|
|
"name": "diffie-hellman-group-exchange-sha1",
|
|
"notes": ""
|
|
}
|
|
],
|
|
"key": [
|
|
{
|
|
"name": "ssh-rsa",
|
|
"notes": ""
|
|
},
|
|
{
|
|
"name": "ssh-rsa-cert-v01@openssh.com",
|
|
"notes": ""
|
|
}
|
|
],
|
|
"mac": [
|
|
{
|
|
"name": "hmac-md5",
|
|
"notes": ""
|
|
},
|
|
{
|
|
"name": "hmac-md5-96",
|
|
"notes": ""
|
|
},
|
|
{
|
|
"name": "hmac-ripemd160",
|
|
"notes": ""
|
|
},
|
|
{
|
|
"name": "hmac-ripemd160@openssh.com",
|
|
"notes": ""
|
|
},
|
|
{
|
|
"name": "hmac-sha1",
|
|
"notes": ""
|
|
},
|
|
{
|
|
"name": "hmac-sha1-96",
|
|
"notes": ""
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"warning": {
|
|
"del": {
|
|
"enc": [
|
|
{
|
|
"name": "aes128-cbc",
|
|
"notes": ""
|
|
},
|
|
{
|
|
"name": "aes192-cbc",
|
|
"notes": ""
|
|
},
|
|
{
|
|
"name": "aes256-cbc",
|
|
"notes": ""
|
|
}
|
|
],
|
|
"mac": [
|
|
{
|
|
"name": "umac-64@openssh.com",
|
|
"notes": ""
|
|
}
|
|
]
|
|
}
|
|
}
|
|
},
|
|
"target": "localhost:2222"
|
|
}
|