Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-46805 PoC — Ivanti ICS 授权问题漏洞

Source
Associated Vulnerability
Title:Ivanti ICS 授权问题漏洞 (CVE-2023-46805)
Description:Ivanti ICS是美国Ivanti公司的一代远程安全访问产品。 Ivanti ICS 9.x版本、22.x版本、Ivanti Policy Secure存在授权问题漏洞,该漏洞源于 Web 组件中存在身份验证绕过漏洞。攻击者利用该漏洞可以绕过控制检查来访问受限资源。
Description
Simple scanner for scanning a list of ip-addresses for vulnerable Ivanti Pulse Secure devices
Readme
19/01/2024 ***** Update *******
Updated with the latest info based on Assetnote's blog. 
Now three checks are executed before a status is shown, this also to better detect older versions of Avanti

Blogs with analysis of the CVE:
https://attackerkb.com/topics/AdUh6by52K/cve-2023-46805/rapid7-analysis
https://www.assetnote.io/resources/research/high-signal-detection-and-exploitation-of-ivantis-pulse-connect-secure-auth-bypass-rce

# CVE-2023-46805
Simple scanner for scanning a list of ip-addresses for vulnerable Ivanti Pulse Secure devices

1. Scan a service like Shodan or Censys for the relevant devices and create a list of ip_adresses.
2. Save them to "ip_list.txt" and in the same folder as this script
3. run the script and it will show output to screen and save to a csv file once finished

File Snapshot

[4.0K] /data/pocs/3303bd3fadcb1391cb71727095a4694b33e3b278 ├── [ 803] README.md └── [2.1K] scan_Ivanti.py 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.