Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-7593 PoC — Ivanti Virtual Traffic Manager 安全漏洞

Source
Associated Vulnerability
Title:Ivanti Virtual Traffic Manager 安全漏洞 (CVE-2024-7593)
Description:Ivanti Virtual Traffic Manager是美国Ivanti公司的一款基于软件的应用程序交付控制器。 Ivanti vTM 22.2R1版本、22.7R2版本存在安全漏洞,该漏洞源于身份验证算法存在错误。攻击者利用该漏洞可以绕过管理面板的身份验证。
Description
CVE-2024-7593 Ivanti Virtual Traffic Manager 22.2R1 / 22.7R2 Admin Panel Authentication Bypass PoC [EXPLOIT]
Readme
# CVE-2024-7593 Exploit Script

This Bash script serves as a proof of concept (PoC) for exploiting the authentication bypass vulnerability in Ivanti vTM (CVE-2024-7593). It allows users to create a new admin user on the target system.

## Table of Contents

- [Prerequisites](#prerequisites)
- [Usage](#usage)
- [Parameters](#parameters)
- [Example](#example)
- [Author](#author)
- [License](#license)

## Prerequisites

Make sure you have the following installed on your system:

- curl: This script uses `curl` to send HTTP requests.

You can check if curl is installed by running:

``bash
command -v curl``


If it's not installed, you can install it using your package manager. For example, on Ubuntu:

``sudo apt-get install curl``

## Usage
To run the script, change permissions to +x and use the following command:

``./CVE-2024-7593.sh -u <host> -p <port>``


``<host>``: The target host (e.g., example.com).

``<port>``: The target port (e.g., 9090).


## Example

``./CVE-2024-7593.sh -u example.com -p 9090``


<img src="https://i.imgur.com/uP5WGqB.png" alt="CVE-2024-7593 PoC Screenshot" />

## Response Handling
If the new user is successfully created, the script will display the login credentials.
If the user creation fails, it will inform you of the failure.



## Author
D3N14LD15K&nbsp;&nbsp;&nbsp;:::&nbsp;&nbsp;&nbsp;D3N14LD15K[at]BUGCROWDNINJA.COM&nbsp;&nbsp;&nbsp;:::&nbsp;&nbsp;&nbsp;X.COM/D3N14LD15K



## Disclaimer
This proof of concept is for educational purposes only. You are responsible for your own use of this script.
File Snapshot

[4.0K] /data/pocs/a4c4f9a40c78193cb18f5e789fcb544d02962d43 ├── [1.9K] CVE-2024-7593.sh └── [1.5K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.