Skip to content

Commit 9e1dbca

Browse files
authored
Merge branch 'master' into securestep9-patch-v0.3.3-1
2 parents d7db43e + 1ac1462 commit 9e1dbca

File tree

4 files changed

+152
-3
lines changed

4 files changed

+152
-3
lines changed
Lines changed: 48 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,48 @@
1+
info:
2+
name: ivanti_epmm_lastpatcheddate_scan
3+
author: OWASP Nettacker Team
4+
severity: 3
5+
description: Ivanti EPMM Last Patched Date Scan
6+
reference:
7+
profiles:
8+
- scan
9+
- http
10+
- ivanti
11+
- low_severity
12+
13+
payloads:
14+
- library: http
15+
steps:
16+
- method: head
17+
timeout: 3
18+
headers:
19+
User-Agent: "{user_agent}"
20+
allow_redirects: false
21+
ssl: false
22+
url:
23+
nettacker_fuzzer:
24+
input_format: "{{schema}}://{target}:{{ports}}/mifs/css/pages/userlogin.css"
25+
prefix: ""
26+
suffix: ""
27+
interceptors:
28+
data:
29+
schema:
30+
- "http"
31+
- "https"
32+
ports:
33+
- 80
34+
- 443
35+
response:
36+
condition_type: and
37+
log: "response_dependent['headers']['Last-Modified']"
38+
conditions:
39+
status_code:
40+
regex: "200"
41+
reverse: false
42+
headers:
43+
Last-Modified:
44+
regex: .*
45+
reverse: false
46+
Content-Type:
47+
regex: "css"
48+
reverse: false
Lines changed: 48 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,48 @@
1+
info:
2+
name: ivanti_ics_lastpatcheddate_scan
3+
author: OWASP Nettacker Team
4+
severity: 3
5+
description: Ivanti ICS Last Patched Date Scan
6+
reference:
7+
profiles:
8+
- scan
9+
- http
10+
- ivanti
11+
- low_severity
12+
13+
payloads:
14+
- library: http
15+
steps:
16+
- method: head
17+
timeout: 3
18+
headers:
19+
User-Agent: "{user_agent}"
20+
allow_redirects: false
21+
ssl: false
22+
url:
23+
nettacker_fuzzer:
24+
input_format: "{{schema}}://{target}:{{ports}}/dana-na/css/ds.js"
25+
prefix: ""
26+
suffix: ""
27+
interceptors:
28+
data:
29+
schema:
30+
- "http"
31+
- "https"
32+
ports:
33+
- 80
34+
- 443
35+
response:
36+
condition_type: and
37+
log: "response_dependent['headers']['Last-Modified']"
38+
conditions:
39+
status_code:
40+
regex: "200"
41+
reverse: false
42+
headers:
43+
Last-Modified:
44+
regex: .*
45+
reverse: false
46+
Content-Type:
47+
regex: "javascript"
48+
reverse: false
Lines changed: 53 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,53 @@
1+
info:
2+
name: ivanti_epmm_cve_2023_35082_vuln
3+
author: OWASP Nettacker team
4+
severity: 9.8
5+
description: CVE-2023-35082 is an authentication bypass in Ivanti Endpoint Manager Mobile (EPMM) and MobileIron Core
6+
reference:
7+
- https://forums.ivanti.com/s/article/CVE-2023-35082-Remote-Unauthenticated-API-Access-Vulnerability-in-MobileIron-Core-11-2-and-older
8+
- https://www.cisa.gov/news-events/alerts/2024/01/18/cisa-adds-one-known-exploited-vulnerability-catalog
9+
- https://www.helpnetsecurity.com/2024/01/19/exploited-cve-2023-35082/
10+
- https://www.rapid7.com/blog/post/2023/08/02/cve-2023-35082-mobileiron-core-unauthenticated-api-access-vulnerability/
11+
profiles:
12+
- vuln
13+
- vulnerability
14+
- http
15+
- high_severity
16+
- cve
17+
- ivanti
18+
- ivanti_epmm
19+
- cisa_kev
20+
21+
payloads:
22+
- library: http
23+
steps:
24+
- method: get
25+
timeout: 3
26+
headers:
27+
User-Agent: "{user_agent}"
28+
allow_redirects: false
29+
ssl: false
30+
url:
31+
nettacker_fuzzer:
32+
input_format: "{{schema}}://{target}:{{ports}}/{{paths}}"
33+
prefix: ""
34+
suffix: ""
35+
interceptors:
36+
data:
37+
paths:
38+
- "mifs/asfV3/api/v2/ping"
39+
schema:
40+
- "http"
41+
- "https"
42+
ports:
43+
- 80
44+
- 443
45+
response:
46+
condition_type: and
47+
conditions:
48+
status_code:
49+
regex: "200"
50+
reverse: false
51+
content:
52+
regex: "vspVersion"
53+
reverse: false

modules/vuln/ivanti_ics_cve_2023_46805.yaml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ payloads:
2222
- method: get
2323
timeout: 3
2424
headers:
25-
User-Agent: "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/112.0.5615.138 Safari/537.36"
25+
User-Agent: "{user_agent}"
2626
allow_redirects: false
2727
ssl: false
2828
url:
@@ -44,8 +44,8 @@ payloads:
4444
condition_type: and
4545
conditions:
4646
status_code:
47-
regex: '403'
47+
regex: "403"
4848
reverse: false
4949
content:
50-
regex: '<html>'
50+
regex: "<html>"
5151
reverse: true

0 commit comments

Comments
 (0)