File tree Expand file tree Collapse file tree 4 files changed +152
-3
lines changed Expand file tree Collapse file tree 4 files changed +152
-3
lines changed Original file line number Diff line number Diff line change 1+ info :
2+ name : ivanti_epmm_lastpatcheddate_scan
3+ author : OWASP Nettacker Team
4+ severity : 3
5+ description : Ivanti EPMM Last Patched Date Scan
6+ reference :
7+ profiles :
8+ - scan
9+ - http
10+ - ivanti
11+ - low_severity
12+
13+ payloads :
14+ - library : http
15+ steps :
16+ - method : head
17+ timeout : 3
18+ headers :
19+ User-Agent : " {user_agent}"
20+ allow_redirects : false
21+ ssl : false
22+ url :
23+ nettacker_fuzzer :
24+ input_format : " {{schema}}://{target}:{{ports}}/mifs/css/pages/userlogin.css"
25+ prefix : " "
26+ suffix : " "
27+ interceptors :
28+ data :
29+ schema :
30+ - " http"
31+ - " https"
32+ ports :
33+ - 80
34+ - 443
35+ response :
36+ condition_type : and
37+ log : " response_dependent['headers']['Last-Modified']"
38+ conditions :
39+ status_code :
40+ regex : " 200"
41+ reverse : false
42+ headers :
43+ Last-Modified :
44+ regex : .*
45+ reverse : false
46+ Content-Type :
47+ regex : " css"
48+ reverse : false
Original file line number Diff line number Diff line change 1+ info :
2+ name : ivanti_ics_lastpatcheddate_scan
3+ author : OWASP Nettacker Team
4+ severity : 3
5+ description : Ivanti ICS Last Patched Date Scan
6+ reference :
7+ profiles :
8+ - scan
9+ - http
10+ - ivanti
11+ - low_severity
12+
13+ payloads :
14+ - library : http
15+ steps :
16+ - method : head
17+ timeout : 3
18+ headers :
19+ User-Agent : " {user_agent}"
20+ allow_redirects : false
21+ ssl : false
22+ url :
23+ nettacker_fuzzer :
24+ input_format : " {{schema}}://{target}:{{ports}}/dana-na/css/ds.js"
25+ prefix : " "
26+ suffix : " "
27+ interceptors :
28+ data :
29+ schema :
30+ - " http"
31+ - " https"
32+ ports :
33+ - 80
34+ - 443
35+ response :
36+ condition_type : and
37+ log : " response_dependent['headers']['Last-Modified']"
38+ conditions :
39+ status_code :
40+ regex : " 200"
41+ reverse : false
42+ headers :
43+ Last-Modified :
44+ regex : .*
45+ reverse : false
46+ Content-Type :
47+ regex : " javascript"
48+ reverse : false
Original file line number Diff line number Diff line change 1+ info :
2+ name : ivanti_epmm_cve_2023_35082_vuln
3+ author : OWASP Nettacker team
4+ severity : 9.8
5+ description : CVE-2023-35082 is an authentication bypass in Ivanti Endpoint Manager Mobile (EPMM) and MobileIron Core
6+ reference :
7+ - https://forums.ivanti.com/s/article/CVE-2023-35082-Remote-Unauthenticated-API-Access-Vulnerability-in-MobileIron-Core-11-2-and-older
8+ - https://www.cisa.gov/news-events/alerts/2024/01/18/cisa-adds-one-known-exploited-vulnerability-catalog
9+ - https://www.helpnetsecurity.com/2024/01/19/exploited-cve-2023-35082/
10+ - https://www.rapid7.com/blog/post/2023/08/02/cve-2023-35082-mobileiron-core-unauthenticated-api-access-vulnerability/
11+ profiles :
12+ - vuln
13+ - vulnerability
14+ - http
15+ - high_severity
16+ - cve
17+ - ivanti
18+ - ivanti_epmm
19+ - cisa_kev
20+
21+ payloads :
22+ - library : http
23+ steps :
24+ - method : get
25+ timeout : 3
26+ headers :
27+ User-Agent : " {user_agent}"
28+ allow_redirects : false
29+ ssl : false
30+ url :
31+ nettacker_fuzzer :
32+ input_format : " {{schema}}://{target}:{{ports}}/{{paths}}"
33+ prefix : " "
34+ suffix : " "
35+ interceptors :
36+ data :
37+ paths :
38+ - " mifs/asfV3/api/v2/ping"
39+ schema :
40+ - " http"
41+ - " https"
42+ ports :
43+ - 80
44+ - 443
45+ response :
46+ condition_type : and
47+ conditions :
48+ status_code :
49+ regex : " 200"
50+ reverse : false
51+ content :
52+ regex : " vspVersion"
53+ reverse : false
Original file line number Diff line number Diff line change @@ -22,7 +22,7 @@ payloads:
2222 - method : get
2323 timeout : 3
2424 headers :
25- User-Agent : " Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/112.0.5615.138 Safari/537.36 "
25+ User-Agent : " {user_agent} "
2626 allow_redirects : false
2727 ssl : false
2828 url :
@@ -44,8 +44,8 @@ payloads:
4444 condition_type : and
4545 conditions :
4646 status_code :
47- regex : ' 403'
47+ regex : " 403"
4848 reverse : false
4949 content :
50- regex : ' <html>'
50+ regex : " <html>"
5151 reverse : true
You can’t perform that action at this time.
0 commit comments