Skip to content

Commit 3111921

Browse files
authored
New Module: Ivanti EPMM CVE-2023-35082
detect Ivanti EPMM CVE-2023-35082 vulnerability Signed-off-by: Sam Stepanyan <[email protected]>
1 parent 468bcf6 commit 3111921

File tree

1 file changed

+53
-0
lines changed

1 file changed

+53
-0
lines changed
Lines changed: 53 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,53 @@
1+
info:
2+
name: ivanti_epmm_cve_2023_35082_vuln
3+
author: OWASP Nettacker team
4+
severity: 9.8
5+
description: CVE-2023-35082 is an authentication bypass in Ivanti Endpoint Manager Mobile (EPMM) and MobileIron Core
6+
reference:
7+
- https://forums.ivanti.com/s/article/CVE-2023-35082-Remote-Unauthenticated-API-Access-Vulnerability-in-MobileIron-Core-11-2-and-older
8+
- https://www.cisa.gov/news-events/alerts/2024/01/18/cisa-adds-one-known-exploited-vulnerability-catalog
9+
- https://www.helpnetsecurity.com/2024/01/19/exploited-cve-2023-35082/
10+
- https://www.rapid7.com/blog/post/2023/08/02/cve-2023-35082-mobileiron-core-unauthenticated-api-access-vulnerability/
11+
profiles:
12+
- vuln
13+
- vulnerability
14+
- http
15+
- high_severity
16+
- cve
17+
- ivanti
18+
- ivanti_epmm
19+
- cisa_kev
20+
21+
payloads:
22+
- library: http
23+
steps:
24+
- method: get
25+
timeout: 3
26+
headers:
27+
User-Agent: "{user_agent}"
28+
allow_redirects: false
29+
ssl: false
30+
url:
31+
nettacker_fuzzer:
32+
input_format: "{{schema}}://{target}:{{ports}}/{{paths}}"
33+
prefix: ""
34+
suffix: ""
35+
interceptors:
36+
data:
37+
paths:
38+
- "mifs/asfV3/api/v2/ping"
39+
schema:
40+
- "http"
41+
- "https"
42+
ports:
43+
- 80
44+
- 443
45+
response:
46+
condition_type: and
47+
conditions:
48+
status_code:
49+
regex: "200"
50+
reverse: false
51+
content:
52+
regex: "vspVersion"
53+
reverse: false

0 commit comments

Comments
 (0)