Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-35082 PoC — Ivanti EPMM 授权问题漏洞

Source
Associated Vulnerability
Title:Ivanti EPMM 授权问题漏洞 (CVE-2023-35082)
Description:Ivanti EPMM是美国Ivanti公司的一个移动管理软件引擎。 Ivanti EPMM 11.10及之前版本存在安全漏洞,该漏洞源于存在身份验证绕过漏洞,允许未经授权的用户在未经正确身份验证的情况下访问应用程序的受限功能或资源。
Description
Remote Unauthenticated API Access Vulnerability in MobileIron Core 11.2 and older
Readme
# 🕵️ Vulnerability Scanner 🛡️

This Python script helps you scan websites for specific vulnerabilities and fetches information regarding authorized users.

## 📌 Features

- Scans URLs for known vulnerabilities (CVE-2023-35082, CVE-2023-35078).
- Retrieves and prints the first 10 email addresses, display names, last login IPs, and roles.
- Supports mass scanning through a file containing a list of URLs.
- Can output results to a file.

## 🔧 How to Use

1. Clone the repository or download the script.
2. Install the required dependencies:

   ```bash
   pip install -r requirements.txt
   ```

3. Run the script with the desired options:

   - Single URL:

     ```bash
     python exploit.py -u <URL> --verbose
     ```

   - Multiple URLs from a file:

     ```bash
     python exploit.py -f <file.txt> --verbose
     ```

   - Save output to a file:

     ```bash
     python exploit.py -u <URL> -o <output_file.txt>
     ```

## 🎓 Parameters

- `-u, --url`: Base URL for the request.
- `-f, --file`: File containing a list of URLs for mass scanning.
- `-o, --output`: Output file to save vulnerable URLs and first 5 emails.
- `--verbose`: Verbose mode (optional).

## 🛑 Disclaimer

Please use this script responsibly and only on websites that you have the proper authorization to scan. Unauthorized scanning may lead to legal issues.


File Snapshot

[4.0K] /data/pocs/0dce39a889c412627bc4a384acd7f69450d0d962 ├── [5.6K] exploit.py ├── [1.3K] README.md └── [ 69] requirements.txt 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.