Skip to content

Commit 75201b0

Browse files
committed
Updated references
references, affected versions, credits
1 parent 7bfc386 commit 75201b0

File tree

2 files changed

+23
-9
lines changed

2 files changed

+23
-9
lines changed

documentation/modules/auxiliary/admin/http/ivanti_vtm_admin.md

Lines changed: 16 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,21 +1,32 @@
11
## Vulnerable Application
22

3-
This module exploits an access control issue in Ivanti Virtual Traffic Manager (VTM) 22.7R1, by adding a new
3+
This module exploits an access control issue in Ivanti Virtual Traffic Manager (vTM), by adding a new
44
administrative user to the web interface of the application.
55

6-
The original advisory is available [here](https://packetstormsecurity.com/files/179906).
6+
Affected versions include:
7+
* 22.2
8+
* 22.3
9+
* 22.3R2
10+
* 22.5R1
11+
* 22.6R1
12+
* 22.7R1
13+
14+
The vendor published an advisory [here]
15+
(https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Virtual-Traffic-Manager-vTM-CVE-2024-7593?language=en_US).
16+
17+
A proof-of-concept is available [here](https://packetstormsecurity.com/files/179906).
718

819
## Testing
920

10-
The software can be obtained from [here](https://hubgw.docker.com/r/pulsesecure/vtm).
21+
Docker images with the software are available from [here](https://hubgw.docker.com/r/pulsesecure/vtm).
1122

1223
**Successfully tested on**
1324

1425
- 22.7R1 on Ubuntu 20.04.6 LTS
1526

1627
## Verification Steps
1728

18-
1. Deploy Ivanti Virtual Traffic Manager (VTM)
29+
1. Deploy Ivanti Virtual Traffic Manager (vTM)
1930
2. Start `msfconsole`
2031
3. `use auxiliary/admin/http/ivanti_vtm_admin`
2132
4. `set RHOSTS <IP>`
@@ -32,7 +43,7 @@ Password to be used when creating a new user with admin privileges.
3243

3344
## Scenarios
3445

35-
Running the module against Virtual Traffic Manager (VTM) 22.7R1 should result in an output
46+
Running the module against Virtual Traffic Manager (vTM) 22.7R1 should result in an output
3647
similar to the following:
3748

3849
```

modules/auxiliary/admin/http/ivanti_vtm_admin.rb

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,17 +6,20 @@ def initialize(info = {})
66
super(
77
update_info(
88
info,
9-
'Name' => 'Ivanti Virtual Traffic Manager Authentication Bypass',
9+
'Name' => 'Ivanti Virtual Traffic Manager Authentication Bypass (CVE-2024-7593)',
1010
'Description' => %q{
11-
This module exploits an access control issue in Ivanti Virtual Traffic Manager 22.7R1, by adding a new
11+
This module exploits an access control issue in Ivanti Virtual Traffic Manager (vTM), by adding a new
1212
administrative user to the web interface of the application.
1313
},
1414
'Author' => [
1515
'Michael Heinzl', # MSF Module
16-
'ohnoisploited' # Discovery and PoC
16+
'ohnoisploited', # PoC
17+
'mxalias' # Credited in the vendor advisory for the discovery, https://hackerone.com/mxalias?type=user
1718
],
1819
'References' => [
19-
['PACKETSTORM', '179906']
20+
['PACKETSTORM', '179906'],
21+
['CVE', '2024-7593'],
22+
['URL', 'https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Virtual-Traffic-Manager-vTM-CVE-2024-7593?language=en_US']
2023
],
2124
'DisclosureDate' => '2024-08-05',
2225
'DefaultOptions' => {

0 commit comments

Comments
 (0)