支持本站 — 捐款将帮助我们持续运营

目标: 1000 元,已筹: 1000

100.0%

POC详情: 26705b5f6a255c3e339cbf749761259e082be84b

来源
关联漏洞
标题:Ivanti Endpoint Manager Mobile 代码注入漏洞 (CVE-2025-4428)
Description:Ivanti Endpoint Manager Mobile(Ivanti EPMM)是美国Ivanti公司的一个移动管理软件引擎。 Ivanti Endpoint Manager Mobile 12.5.0.0及之前版本存在代码注入漏洞,该漏洞源于API组件允许通过特制请求执行任意代码。
Description
Ivanti EPMM Pre-Auth RCE Chain
介绍
# CVE-2025-4427 & CVE-2025-4428 Vulnerability Scanner

![Python Version](https://img.shields.io/badge/python-3.6%2B-blue)
![License](https://img.shields.io/badge/license-MIT-green)

Advanced detection tool for identifying systems vulnerable to the CVE-2025-4427 and CVE-2025-4428 exploit chain. This security scanner helps identify vulnerable endpoints and demonstrates proof-of-concept exploitation.

## Features

- 🛡️ **Vulnerability Detection**: Identifies vulnerable systems through signature analysis
- 💻 **Command Execution**: Allows safe testing of vulnerability via controlled command execution
- 🔄 **Retry Mechanism**: Automatic retry for failed connections
- 📄 **Logging System**: Detailed logging with file and console outputs
- 🌐 **Proxy Support**: Configurable proxy settings for traffic inspection
- 🔧 **Multi-Shell Support**: Compatible with both bash and sh environments
- 📊 **Output Redirection**: Save results to external files

## Installation

1. **Requirements**:
   - Python 3.6+
   - requests library

2. **Install dependencies**:
```bash
pip install requests
```

## Usage

### Basic Command

```
python scanner.py -H http://target-site.com/
```

### Full Syntax

```
python scanner.py -H [TARGET_URL] [OPTIONS]
```

### Options

| Parameter |                    Description                    |
| :-------: | :-----------------------------------------------: |
|    -H     |               Target URL (required)               |
|    -c     |        Command to execute (default: 'id')         |
|    -s     |                 Shell type [bash                  |
|    -x     | Proxy configuration (e.g.: http://127.0.0.1:8080) |
|    -t     |     Request timeout in seconds (default: 15)      |
|    -r     |      Connection retry attempts (default: 2)       |
|    -o     |                 Output file path                  |

## Examples

1. Basic vulnerability check:

```
python scanner.py -H https://example.com/
```

1. Custom command execution with proxy:

```
python scanner.py -H http://internal-server/ -c "uname -a" -x http://proxy:8080
```

1. Full test with output redirection:

```
python scanner.py -H http://test-site.com/ -s sh -t 30 -o results.txt
```

## Important Notes

- 🚨 **Legal Compliance**: Use only on authorized systems
- 🔒 **Security Advisory**: For testing purposes only
- ⚠️ **Ethical Warning**: Do not use for illegal activities
- 📝 **Best Practice**: Always verify results manually
- 🔍 **Accuracy**: False positives/negatives possible - use as initial screening tool

## Exit Codes

| Code |        Description         |
| :--: | :------------------------: |
|  0   | Vulnerable system detected |
|  1   |   No vulnerability found   |
|  2   |  Execution error occurred  |
## License

Distributed under MIT License. See `LICENSE` for full text.
文件快照

[4.0K] /data/pocs/26705b5f6a255c3e339cbf749761259e082be84b ├── [2.1K] CVE-2025-4427.yaml ├── [8.3K] CVE-2025-4428.py └── [2.8K] README.md 0 directories, 3 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮件到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对 POC 代码进行快照,为了长期维护,请考虑为本地 POC 付费/捐赠,感谢您的支持。