Skip to content

Commit 9c72a85

Browse files
committed
Verified more versions
Verified exploit against more affected versions
1 parent 75201b0 commit 9c72a85

File tree

2 files changed

+11
-5
lines changed

2 files changed

+11
-5
lines changed

documentation/modules/auxiliary/admin/http/ivanti_vtm_admin.md

Lines changed: 9 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -4,12 +4,12 @@ This module exploits an access control issue in Ivanti Virtual Traffic Manager (
44
administrative user to the web interface of the application.
55

66
Affected versions include:
7-
* 22.2
8-
* 22.3
9-
* 22.3R2
10-
* 22.5R1
11-
* 22.6R1
127
* 22.7R1
8+
* 22.6R1
9+
* 22.5R1
10+
* 22.3R2
11+
* 22.3
12+
* 22.2
1313

1414
The vendor published an advisory [here]
1515
(https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Virtual-Traffic-Manager-vTM-CVE-2024-7593?language=en_US).
@@ -23,6 +23,10 @@ Docker images with the software are available from [here](https://hubgw.docker.c
2323
**Successfully tested on**
2424

2525
- 22.7R1 on Ubuntu 20.04.6 LTS
26+
- 22.6R1 on Ubuntu 20.04.6 LTS
27+
- 22.5R1 on Ubuntu 20.04.6 LTS
28+
- 22.3R1 on Ubuntu 20.04.5 LTS
29+
- 22.2 on Ubuntu 20.04.4 LTS
2630

2731
## Verification Steps
2832

modules/auxiliary/admin/http/ivanti_vtm_admin.rb

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,8 @@ def initialize(info = {})
1010
'Description' => %q{
1111
This module exploits an access control issue in Ivanti Virtual Traffic Manager (vTM), by adding a new
1212
administrative user to the web interface of the application.
13+
14+
Affected versions include 22.7R1, 22.6R1, 22.5R1, 22.3R2, 22.3, 22.2.
1315
},
1416
'Author' => [
1517
'Michael Heinzl', # MSF Module

0 commit comments

Comments
 (0)