Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-7593 PoC — Ivanti Virtual Traffic Manager 安全漏洞

Source
Associated Vulnerability
Title:Ivanti Virtual Traffic Manager 安全漏洞 (CVE-2024-7593)
Description:Ivanti Virtual Traffic Manager是美国Ivanti公司的一款基于软件的应用程序交付控制器。 Ivanti vTM 22.2R1版本、22.7R2版本存在安全漏洞,该漏洞源于身份验证算法存在错误。攻击者利用该漏洞可以绕过管理面板的身份验证。
Readme
# CVE-2024-7593
### Description: 

CVE-2024-7593 is a critical vulnerability affecting multiple Pulse Secure products, including Pulse Secure VPN. This vulnerability allows an authenticated attacker with access to the management interface to execute arbitrary commands on the affected server. This can lead to the execution of malicious code, compromising the integrity and availability of the system.

Technical Details
Type: Remote Code Execution (RCE).
Severity: Critical (CVSS: 9.8).
Affected Versions: Specific versions of Pulse Secure VPN are impacted; please consult Pulse Secure's security advisory for details.
Potential Impact
An attacker exploiting this vulnerability could:

Gain full control over the affected server.
Redirect traffic or manipulate data.
Access confidential information stored on the system.
Mitigation Measures
It is recommended that system administrators update to the latest software version and apply security patches provided by Pulse Secure. Additionally, restricting access to the management interface to only necessary users is advised.

# Dorks

FOFA Query: 
app="Virtual-Traffic-Manager"
ZoomEye Dork: 
app:"Virtual Traffic Manager Appliance"

# Note
The Pulse Secure VPN typically uses port 9090 for its management interface. This port can be a target for attackers, especially in light of vulnerabilities like CVE-2024-7593. Securing this port by limiting access to trusted IPs and monitoring access attempts can help prevent exploitation.

![alt text](image69.png)
File Snapshot

[4.0K] /data/pocs/402530127652a6050240a0fe106241399548e108 ├── [3.2K] CVE-2024-7593.yaml ├── [ 38K] image69.png └── [1.5K] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.