Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Unexpected PASSWORD_SPRAY and USER_AS_PASS Interaction #19525

Open
jetbennett opened this issue Oct 1, 2024 · 1 comment · May be fixed by #19550
Open

Unexpected PASSWORD_SPRAY and USER_AS_PASS Interaction #19525

jetbennett opened this issue Oct 1, 2024 · 1 comment · May be fixed by #19550
Labels

Comments

@jetbennett
Copy link

jetbennett commented Oct 1, 2024

Steps to reproduce

  1. use scanner/ssh/ssh_login
  2. set PASSWORD_SPRAY 1
  3. set USER_AS_PASS 1
  4. set USER_FILE ./usernames.txt
  5. set PASS_FILE ./passwords.txt
  6. set rhosts file:./targets.txt
  7. run

Expected behavior

If username.txt contains:

admin
root

And passwords.txt contains:

password

I expect the module to attempt the following credentials:
admin:admin
root:root
admin:password
root:password

Current behavior

Instead, makes the following attempts:
password:password
admin:password
root:password

Metasploit version

6.4.20-dev

Additional Information

I believe the bug is related to the relatively recently implemented "PASSWORD_SPRAY" option.

@Mathiou04
Copy link

I managed to reproduce the issue on my side, and created a PR that seem to fix it.
I am not familiar with the different steps for issues here, looking at this basecode for the first time, so not sure what the next steps are.
(maybe this bug needed more triaging? 😓 )

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
Status: No status
2 participants