Skip to content

Commit a000a23

Browse files
authored
Merge branch 'master' into master
2 parents f80ac79 + cfa711f commit a000a23

File tree

1 file changed

+51
-0
lines changed

1 file changed

+51
-0
lines changed
Lines changed: 51 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,51 @@
1+
info:
2+
name: ivanti_ics_cve_2023_46805_vuln
3+
author: Jimmy Ly
4+
severity: 8.2
5+
description: CVE-2023-46805 is an authentication bypass that is usually chained with CVE-2024-21887 to perform remote code execution on Ivanti ICS 9.x, 22.x. This module checks whether the mitigations have been applied for CVE-2023-46805.
6+
reference:
7+
- https://forums.ivanti.com/s/article/CVE-2023-46805-Authentication-Bypass-CVE-2024-21887-Command-Injection-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure-Gateways?language=en_US
8+
- https://labs.watchtowr.com/welcome-to-2024-the-sslvpn-chaos-continues-ivanti-cve-2023-46805-cve-2024-21887
9+
profiles:
10+
- vuln
11+
- vulnerability
12+
- http
13+
- high_severity
14+
- cve
15+
- ivanti
16+
- ivanti_connect_secure
17+
- invati_ics
18+
19+
payloads:
20+
- library: http
21+
steps:
22+
- method: get
23+
timeout: 3
24+
headers:
25+
User-Agent: "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/112.0.5615.138 Safari/537.36"
26+
allow_redirects: false
27+
ssl: false
28+
url:
29+
nettacker_fuzzer:
30+
input_format: "{{schema}}://{target}:{{ports}}/{{paths}}"
31+
prefix: ""
32+
suffix: ""
33+
interceptors:
34+
data:
35+
paths:
36+
- "api/v1/configuration/users/user-roles/user-role/rest-userrole1/web/web-bookmarks/bookmark"
37+
schema:
38+
- "http"
39+
- "https"
40+
ports:
41+
- 80
42+
- 443
43+
response:
44+
condition_type: and
45+
conditions:
46+
status_code:
47+
regex: '403'
48+
reverse: false
49+
content:
50+
regex: '<html>'
51+
reverse: true

0 commit comments

Comments
 (0)