Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up

License

NotificationsYou must be signed in to change notification settings

jfrog/jfrog-openssl-tools

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

4 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Overview

This is a collection of simple utilities in the context of recently discovered CVE-2022-3602, CVE-2022-3786, allowing to answer the following questions:

1. Does my server require client authentication

Running the following command

python openssl_req_client_cert.py HOST_NAME PORT

Will determine whether client authentication is required by the SSL server, in which case servers based on OpenSSL 3.0.0..3.0.6 will be vulnerable to CVEs above [https://jfrog.com/knowledge-base/upcoming-openssl-3-x-critical-vulnerability/]

For example:

|ψ> python openssl_req_client_cert.py 127.0.0.1 12345127.0.0.1:12345 -> Client certificate not required

2. Which files on a local machine contain OpenSSL code of vulnerable versions

Applications running OpenSSL are easy to miss if the library is statically linked into an application binary.Running the following command

python scan_vulnerable_openssl_code.py ROOT_DIR

Will recursively scan ROOT_DIR for ELF files, and report the files which include the patternossl_punycode_decode (indicative of versions >=3.0.0), while files which in addition include the patternripemd160_newctx indicative of the updated version (3.0.7) are reported as such.

About

No description, website, or topics provided.

Resources

License

Security policy

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages


[8]ページ先頭

©2009-2025 Movatter.jp