kn6869610 / CVE-2018-10933

Leveraging it is a simple matter of presenting the server with the SSH2_MSG_USERAUTH_SUCCESS message, which shows that the login already occurred without a problem. The server expects the message SSH2_MSG_USERAUTH_REQUEST to start the authentication procedure, but by skipping it an attacker can log in without showing any credentials.
13Updated 6 years ago

Related projects

Alternatives and complementary repositories for CVE-2018-10933