关联漏洞
描述
CVE-2024-7593 Ivanti Virtual Traffic Manager 22.2R1 / 22.7R2 Admin Panel Authentication Bypass PoC [EXPLOIT]
介绍
# CVE-2024-7593 Exploit Script
This Bash script serves as a proof of concept (PoC) for exploiting the authentication bypass vulnerability in Ivanti vTM (CVE-2024-7593). It allows users to create a new admin user on the target system.
## Table of Contents
- [Prerequisites](#prerequisites)
- [Usage](#usage)
- [Parameters](#parameters)
- [Example](#example)
- [Author](#author)
- [License](#license)
## Prerequisites
Make sure you have the following installed on your system:
- curl: This script uses `curl` to send HTTP requests.
You can check if curl is installed by running:
``bash
command -v curl``
If it's not installed, you can install it using your package manager. For example, on Ubuntu:
``sudo apt-get install curl``
## Usage
To run the script, change permissions to +x and use the following command:
``./CVE-2024-7593.sh -u <host> -p <port>``
``<host>``: The target host (e.g., example.com).
``<port>``: The target port (e.g., 9090).
## Example
``./CVE-2024-7593.sh -u example.com -p 9090``
<img src="https://i.imgur.com/uP5WGqB.png" alt="CVE-2024-7593 PoC Screenshot" />
## Response Handling
If the new user is successfully created, the script will display the login credentials.
If the user creation fails, it will inform you of the failure.
## Author
D3N14LD15K ::: D3N14LD15K[at]BUGCROWDNINJA.COM ::: X.COM/D3N14LD15K
## Disclaimer
This proof of concept is for educational purposes only. You are responsible for your own use of this script.
文件快照
[4.0K] /data/pocs/a4c4f9a40c78193cb18f5e789fcb544d02962d43
├── [1.9K] CVE-2024-7593.sh
└── [1.5K] README.md
0 directories, 2 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。