Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-35078 PoC — Ivanti Endpoint Manager Mobile 授权问题漏洞

Source
Associated Vulnerability
Title:Ivanti Endpoint Manager Mobile 授权问题漏洞 (CVE-2023-35078)
Description:Ivanti Endpoint Manager Mobile(Ivanti EPMM)是美国Ivanti公司的一个移动管理软件引擎。 Ivanti Endpoint Manager Mobile 11.10及之前版本存在授权问题漏洞,该漏洞源于存在身份验证绕过,允许远程攻击者获取PII、添加管理帐户并更改配置。
Description
Easy and non-intrusive script to check for CVE-2023-35078
Readme
# CVE-2023-35078

This script ethically checks for the presence of cve-2023-35078 via requesting the `/ping` endpoint from the Ivanti EPMM API. 

`/ping` simply responds with the VSP version, rather than attemping to pull device or admin data.

Usage: `./CVE-2023-35078 <IP/Hostname>`

This script assumes https connections over default port.

## Setup

- Setup virtual env: `python3 -m venv env`
- Activate env: `source env/bin/activate`
- Install dependencies: `pip3 install -r requirements.txt`

File Snapshot

[4.0K] /data/pocs/50cf459dcee85975f79ece4951f7daff4d68c0a9 ├── [1.5K] CVE-2023-35078.py ├── [ 499] README.md └── [ 87] requirements.txt 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.