Easy and non-intrusive script to check for CVE-2023-35078# CVE-2023-35078
This script ethically checks for the presence of cve-2023-35078 via requesting the `/ping` endpoint from the Ivanti EPMM API.
`/ping` simply responds with the VSP version, rather than attemping to pull device or admin data.
Usage: `./CVE-2023-35078 <IP/Hostname>`
This script assumes https connections over default port.
## Setup
- Setup virtual env: `python3 -m venv env`
- Activate env: `source env/bin/activate`
- Install dependencies: `pip3 install -r requirements.txt`
[4.0K] /data/pocs/50cf459dcee85975f79ece4951f7daff4d68c0a9
├── [1.5K] CVE-2023-35078.py
├── [ 499] README.md
└── [ 87] requirements.txt
0 directories, 3 files