File tree Expand file tree Collapse file tree 1 file changed +53
-0
lines changed Expand file tree Collapse file tree 1 file changed +53
-0
lines changed Original file line number Diff line number Diff line change 1+ info :
2+ name : ivanti_epmm_cve_2023_35082_vuln
3+ author : OWASP Nettacker team
4+ severity : 9.8
5+ description : CVE-2023-35082 is an authentication bypass in Ivanti Endpoint Manager Mobile (EPMM) and MobileIron Core
6+ reference :
7+ - https://forums.ivanti.com/s/article/CVE-2023-35082-Remote-Unauthenticated-API-Access-Vulnerability-in-MobileIron-Core-11-2-and-older
8+ - https://www.cisa.gov/news-events/alerts/2024/01/18/cisa-adds-one-known-exploited-vulnerability-catalog
9+ - https://www.helpnetsecurity.com/2024/01/19/exploited-cve-2023-35082/
10+ - https://www.rapid7.com/blog/post/2023/08/02/cve-2023-35082-mobileiron-core-unauthenticated-api-access-vulnerability/
11+ profiles :
12+ - vuln
13+ - vulnerability
14+ - http
15+ - high_severity
16+ - cve
17+ - ivanti
18+ - ivanti_epmm
19+ - cisa_kev
20+
21+ payloads :
22+ - library : http
23+ steps :
24+ - method : get
25+ timeout : 3
26+ headers :
27+ User-Agent : " {user_agent}"
28+ allow_redirects : false
29+ ssl : false
30+ url :
31+ nettacker_fuzzer :
32+ input_format : " {{schema}}://{target}:{{ports}}/{{paths}}"
33+ prefix : " "
34+ suffix : " "
35+ interceptors :
36+ data :
37+ paths :
38+ - " mifs/asfV3/api/v2/ping"
39+ schema :
40+ - " http"
41+ - " https"
42+ ports :
43+ - 80
44+ - 443
45+ response :
46+ condition_type : and
47+ conditions :
48+ status_code :
49+ regex : " 200"
50+ reverse : false
51+ content :
52+ regex : " vspVersion"
53+ reverse : false
You can’t perform that action at this time.
0 commit comments