Skip to content

Commit 74c8ce9

Browse files
authored
Merge branch 'master' into snyk-fix-45537895660e2c31d984f2042b819b69
2 parents 62c5899 + d170db9 commit 74c8ce9

File tree

2 files changed

+102
-0
lines changed

2 files changed

+102
-0
lines changed
Lines changed: 51 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,51 @@
1+
info:
2+
name: ivanti_ics_cve_2023_46805_vuln
3+
author: Jimmy Ly
4+
severity: 8.2
5+
description: CVE-2023-46805 is an authentication bypass that is usually chained with CVE-2024-21887 to perform remote code execution on Ivanti ICS 9.x, 22.x. This module checks whether the mitigations have been applied for CVE-2023-46805.
6+
reference:
7+
- https://forums.ivanti.com/s/article/CVE-2023-46805-Authentication-Bypass-CVE-2024-21887-Command-Injection-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure-Gateways?language=en_US
8+
- https://labs.watchtowr.com/welcome-to-2024-the-sslvpn-chaos-continues-ivanti-cve-2023-46805-cve-2024-21887
9+
profiles:
10+
- vuln
11+
- vulnerability
12+
- http
13+
- high_severity
14+
- cve
15+
- ivanti
16+
- ivanti_connect_secure
17+
- invati_ics
18+
19+
payloads:
20+
- library: http
21+
steps:
22+
- method: get
23+
timeout: 3
24+
headers:
25+
User-Agent: "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/112.0.5615.138 Safari/537.36"
26+
allow_redirects: false
27+
ssl: false
28+
url:
29+
nettacker_fuzzer:
30+
input_format: "{{schema}}://{target}:{{ports}}/{{paths}}"
31+
prefix: ""
32+
suffix: ""
33+
interceptors:
34+
data:
35+
paths:
36+
- "api/v1/configuration/users/user-roles/user-role/rest-userrole1/web/web-bookmarks/bookmark"
37+
schema:
38+
- "http"
39+
- "https"
40+
ports:
41+
- 80
42+
- 443
43+
response:
44+
condition_type: and
45+
conditions:
46+
status_code:
47+
regex: '403'
48+
reverse: false
49+
content:
50+
regex: '<html>'
51+
reverse: true
Lines changed: 51 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,51 @@
1+
info:
2+
name: wp_plugin_cve_2023_6875_vuln
3+
author: Captain-T2004
4+
severity: 9
5+
description: POST SMTP Mailer – Email log, Delivery Failure Notifications and Best Mail SMTP for WordPress <= 2.8.7 – Unauthenticated Stored Cross-Site Scripting via device
6+
reference:
7+
- https://nvd.nist.gov/vuln/detail/CVE-2023-6875
8+
- https://www.wordfence.com/blog/2024/01/type-juggling-leads-to-two-vulnerabilities-in-post-smtp-mailer-wordpress-plugin/
9+
- https://www.cve.org/CVERecord?id=CVE-2023-6875
10+
profiles:
11+
- vuln
12+
- vulnerability
13+
- http
14+
- critical_severity
15+
- cve2023
16+
- cve
17+
- wordpress
18+
- wp_plugin
19+
20+
payloads:
21+
- library: http
22+
steps:
23+
- method: post
24+
timeout: 3
25+
headers:
26+
User-Agent: "{user_agent}"
27+
allow_redirects: false
28+
ssl: false
29+
url:
30+
nettacker_fuzzer:
31+
input_format: "{{schema}}://{target}:{{ports}}/wp-json/post-smtp/v1/connect-app"
32+
prefix: ""
33+
suffix: ""
34+
interceptors:
35+
data:
36+
schema:
37+
- "http"
38+
- "https"
39+
ports:
40+
- 80
41+
- 443
42+
response:
43+
success_conditions: content
44+
condition_type: and
45+
conditions:
46+
content:
47+
regex: "fcm_token"
48+
reverse: false
49+
status_code:
50+
regex: "200"
51+
reverse: false

0 commit comments

Comments
 (0)