@@ -164561,6 +164561,70 @@
164561
164561
"session_types": false,
164562
164562
"needs_cleanup": true
164563
164563
},
164564
+ "exploit_windows/http/ivanti_epm_recordgoodapp_sqli_rce": {
164565
+ "name": "Ivanti EPM RecordGoodApp SQLi RCE",
164566
+ "fullname": "exploit/windows/http/ivanti_epm_recordgoodapp_sqli_rce",
164567
+ "aliases": [
164568
+
164569
+ ],
164570
+ "rank": 300,
164571
+ "disclosure_date": "2024-05-24",
164572
+ "type": "exploit",
164573
+ "author": [
164574
+ "James Horseman",
164575
+ "Christophe De La Fuente"
164576
+ ],
164577
+ "description": "Ivanti Endpoint Manager (EPM) 2022 SU5 and prior are vulnerable to unauthenticated SQL injection which can be leveraged to achieve unauthenticated remote code execution.",
164578
+ "references": [
164579
+ "URL-https://forums.ivanti.com/s/article/Security-Advisory-May-2024",
164580
+ "URL-https://www.zerodayinitiative.com/advisories/ZDI-24-507",
164581
+ "URL-https://github.com/horizon3ai/CVE-2024-29824",
164582
+ "URL-https://www.horizon3.ai/attack-research/attack-blogs/cve-2024-29824-deep-dive-ivanti-epm-sql-injection-remote-code-execution-vulnerability/",
164583
+ "CVE-2024-29824"
164584
+ ],
164585
+ "platform": "Windows",
164586
+ "arch": "cmd",
164587
+ "rport": 80,
164588
+ "autofilter_ports": [
164589
+ 80,
164590
+ 8080,
164591
+ 443,
164592
+ 8000,
164593
+ 8888,
164594
+ 8880,
164595
+ 8008,
164596
+ 3000,
164597
+ 8443
164598
+ ],
164599
+ "autofilter_services": [
164600
+ "http",
164601
+ "https"
164602
+ ],
164603
+ "targets": [
164604
+ "Automatic Target"
164605
+ ],
164606
+ "mod_time": "2024-06-21 10:13:08 +0000",
164607
+ "path": "/modules/exploits/windows/http/ivanti_epm_recordgoodapp_sqli_rce.rb",
164608
+ "is_install_path": true,
164609
+ "ref_name": "windows/http/ivanti_epm_recordgoodapp_sqli_rce",
164610
+ "check": true,
164611
+ "post_auth": false,
164612
+ "default_credential": false,
164613
+ "notes": {
164614
+ "Stability": [
164615
+ "crash-safe"
164616
+ ],
164617
+ "Reliability": [
164618
+ "repeatable-session"
164619
+ ],
164620
+ "SideEffects": [
164621
+ "ioc-in-logs",
164622
+ "artifacts-on-disk"
164623
+ ]
164624
+ },
164625
+ "session_types": false,
164626
+ "needs_cleanup": null
164627
+ },
164564
164628
"exploit_windows/http/jira_collector_traversal": {
164565
164629
"name": "JIRA Issues Collector Directory Traversal",
164566
164630
"fullname": "exploit/windows/http/jira_collector_traversal",
0 commit comments