|
2864 | 2864 |
|
2865 | 2865 | ]
|
2866 | 2866 | },
|
| 2867 | + "auxiliary_admin/http/ivanti_vtm_admin": { |
| 2868 | + "name": "Ivanti Virtual Traffic Manager Authentication Bypass (CVE-2024-7593)", |
| 2869 | + "fullname": "auxiliary/admin/http/ivanti_vtm_admin", |
| 2870 | + "aliases": [ |
| 2871 | + |
| 2872 | + ], |
| 2873 | + "rank": 300, |
| 2874 | + "disclosure_date": "2024-08-05", |
| 2875 | + "type": "auxiliary", |
| 2876 | + "author": [ |
| 2877 | + "Michael Heinzl", |
| 2878 | + "ohnoisploited", |
| 2879 | + "mxalias" |
| 2880 | + ], |
| 2881 | + "description": "This module exploits an access control issue in Ivanti Virtual Traffic Manager (vTM), by adding a new\n administrative user to the web interface of the application.\n\n Affected versions include 22.7R1, 22.6R1, 22.5R1, 22.3R2, 22.3, 22.2.", |
| 2882 | + "references": [ |
| 2883 | + "PACKETSTORM-179906", |
| 2884 | + "CVE-2024-7593", |
| 2885 | + "URL-https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Virtual-Traffic-Manager-vTM-CVE-2024-7593?language=en_US" |
| 2886 | + ], |
| 2887 | + "platform": "", |
| 2888 | + "arch": "", |
| 2889 | + "rport": 9090, |
| 2890 | + "autofilter_ports": [ |
| 2891 | + 80, |
| 2892 | + 8080, |
| 2893 | + 443, |
| 2894 | + 8000, |
| 2895 | + 8888, |
| 2896 | + 8880, |
| 2897 | + 8008, |
| 2898 | + 3000, |
| 2899 | + 8443 |
| 2900 | + ], |
| 2901 | + "autofilter_services": [ |
| 2902 | + "http", |
| 2903 | + "https" |
| 2904 | + ], |
| 2905 | + "targets": null, |
| 2906 | + "mod_time": "2024-08-16 15:43:34 +0000", |
| 2907 | + "path": "/modules/auxiliary/admin/http/ivanti_vtm_admin.rb", |
| 2908 | + "is_install_path": true, |
| 2909 | + "ref_name": "admin/http/ivanti_vtm_admin", |
| 2910 | + "check": true, |
| 2911 | + "post_auth": true, |
| 2912 | + "default_credential": false, |
| 2913 | + "notes": { |
| 2914 | + "Stability": [ |
| 2915 | + "crash-safe" |
| 2916 | + ], |
| 2917 | + "Reliability": [ |
| 2918 | + "repeatable-session" |
| 2919 | + ], |
| 2920 | + "SideEffects": [ |
| 2921 | + "ioc-in-logs", |
| 2922 | + "config-changes" |
| 2923 | + ] |
| 2924 | + }, |
| 2925 | + "session_types": false, |
| 2926 | + "needs_cleanup": false, |
| 2927 | + "actions": [ |
| 2928 | + |
| 2929 | + ] |
| 2930 | + }, |
2867 | 2931 | "auxiliary_admin/http/jboss_bshdeployer": {
|
2868 | 2932 | "name": "JBoss JMX Console Beanshell Deployer WAR Upload and Deployment",
|
2869 | 2933 | "fullname": "auxiliary/admin/http/jboss_bshdeployer",
|
|
22815 | 22879 |
|
22816 | 22880 | ],
|
22817 | 22881 | "targets": null,
|
22818 |
| - "mod_time": "2020-10-02 17:38:06 +0000", |
| 22882 | + "mod_time": "2024-06-06 14:53:28 +0000", |
22819 | 22883 | "path": "/modules/auxiliary/gather/ie_sandbox_findfiles.rb",
|
22820 | 22884 | "is_install_path": true,
|
22821 | 22885 | "ref_name": "gather/ie_sandbox_findfiles",
|
|
40131 | 40195 | "https"
|
40132 | 40196 | ],
|
40133 | 40197 | "targets": null,
|
40134 |
| - "mod_time": "2022-01-23 15:28:32 +0000", |
| 40198 | + "mod_time": "2024-06-06 14:53:28 +0000", |
40135 | 40199 | "path": "/modules/auxiliary/scanner/http/rails_mass_assignment.rb",
|
40136 | 40200 | "is_install_path": true,
|
40137 | 40201 | "ref_name": "scanner/http/rails_mass_assignment",
|
|
51906 | 51970 | "https"
|
51907 | 51971 | ],
|
51908 | 51972 | "targets": null,
|
51909 |
| - "mod_time": "2024-01-07 15:02:53 +0000", |
| 51973 | + "mod_time": "2024-06-06 14:53:28 +0000", |
51910 | 51974 | "path": "/modules/auxiliary/scanner/sap/sap_icm_urlscan.rb",
|
51911 | 51975 | "is_install_path": true,
|
51912 | 51976 | "ref_name": "scanner/sap/sap_icm_urlscan",
|
|
63627 | 63691 | "autofilter_ports": null,
|
63628 | 63692 | "autofilter_services": null,
|
63629 | 63693 | "targets": null,
|
63630 |
| - "mod_time": "2024-08-09 12:07:39 +0000", |
| 63694 | + "mod_time": "2024-08-27 10:27:45 +0000", |
63631 | 63695 | "path": "/modules/encoders/php/base64.rb",
|
63632 | 63696 | "is_install_path": true,
|
63633 | 63697 | "ref_name": "php/base64",
|
@@ -101318,7 +101382,7 @@
|
101318 | 101382 | "targets": [
|
101319 | 101383 | "CasinoLoader gateway.php"
|
101320 | 101384 | ],
|
101321 |
| - "mod_time": "2020-10-02 17:38:06 +0000", |
| 101385 | + "mod_time": "2024-06-06 14:53:28 +0000", |
101322 | 101386 | "path": "/modules/exploits/multi/http/dexter_casinoloader_exec.rb",
|
101323 | 101387 | "is_install_path": true,
|
101324 | 101388 | "ref_name": "multi/http/dexter_casinoloader_exec",
|
@@ -257229,7 +257293,7 @@
|
257229 | 257293 | "autofilter_ports": null,
|
257230 | 257294 | "autofilter_services": null,
|
257231 | 257295 | "targets": null,
|
257232 |
| - "mod_time": "2023-02-08 13:47:34 +0000", |
| 257296 | + "mod_time": "2024-06-06 14:53:28 +0000", |
257233 | 257297 | "path": "/modules/post/multi/gather/lastpass_creds.rb",
|
257234 | 257298 | "is_install_path": true,
|
257235 | 257299 | "ref_name": "multi/gather/lastpass_creds",
|
|
0 commit comments