Skip to content

Commit d32ce13

Browse files
authored
Update and rename ivanti_ics_cve_2023_46805_and_cve_2024_21887.yaml to ivanti_ics_cve_2023_46805.yaml
1 parent 826405c commit d32ce13

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

modules/vuln/ivanti_ics_cve_2023_46805_and_cve_2024_21887.yaml renamed to modules/vuln/ivanti_ics_cve_2023_46805.yaml

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,16 +1,16 @@
11
info:
2-
name: ivanti_ics_cve_2023_46805_and_cve_2024_21887_vuln
2+
name: ivanti_ics_cve_2023_46805_vuln
33
author: Jimmy Ly
4-
severity: 9.1
5-
description: Ivanti Connect Secure Unauthenticated Remote Code Execution. CVE-2023-46805 is an authentication bypass and CVE-2024-21887 is a command injection vulnerability in the web component of Ivanti ICS 9.x, 22.x. These two vulnerabilites can be chained to allow remote code exeuction as an unauthenticated user.
4+
severity: 8.2
5+
description: CVE-2023-46805 is an authentication bypass that is usually chained with CVE-2024-21887 to perform remote code execution on Ivanti ICS 9.x, 22.x. This module checks whether the mitigations have been applied for CVE-2023-46805.
66
reference:
77
- https://forums.ivanti.com/s/article/CVE-2023-46805-Authentication-Bypass-CVE-2024-21887-Command-Injection-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure-Gateways?language=en_US
88
- https://labs.watchtowr.com/welcome-to-2024-the-sslvpn-chaos-continues-ivanti-cve-2023-46805-cve-2024-21887
99
profiles:
1010
- vuln
1111
- vulnerability
1212
- http
13-
- critical_severity
13+
- high_severity
1414
- cve
1515
- ivanti
1616
- ivanti_connect_secure
@@ -48,4 +48,4 @@ payloads:
4848
reverse: false
4949
content:
5050
regex: '<html>'
51-
reverse: true
51+
reverse: true

0 commit comments

Comments
 (0)