POC详情: a6b9521525abc9847d37171a73ecf5d4720441f7

来源
关联漏洞
标题: Ivanti ICS 授权问题漏洞 (CVE-2023-46805)
描述:Ivanti ICS是美国Ivanti公司的一代远程安全访问产品。 Ivanti ICS 9.x版本、22.x版本、Ivanti Policy Secure存在授权问题漏洞,该漏洞源于 Web 组件中存在身份验证绕过漏洞。攻击者利用该漏洞可以绕过控制检查来访问受限资源。
描述
Tool for checking the Ivanti Connect Secure System Snapshot for IOCs related to CVE-2023-46805 and CVE-2024-21887
介绍
## Pulse Meter

This is a work in progress for parsing the System Snapshot from an Ivanti Connect Secure applicance to identify possible IOCs related to CVE-2023-46805, CVE-2024-21887 and CVE-2025-0282.

**Caveat**: False positives are possible so it's best to check manually to verify any results.

### Note about decrypting the snapshot

The snapshot is encrypted with a hardcoded key. Unfortunately I can't publish the key here, so you will need to find it yourself.

You will need to format the key as a 24 byte hex string, and provide it to the script using the `--key` flag.

### Running

First you will need to install the dependencies:

```
python -m venv env
source env/bin/activate
pip install -r requirements.txt
```

Now you will need to get hold of a System Snapshot from your Ivanti/Pulse Connect Secure appliance.

You can do this by logging into the admin interface and going to `/dana-admin/dump/dump.cgi`.

From here, click the "Take Snapshot" button, wait for it to complete and then download the "Admin generated snapshot" file.

Once you have the snapshot, you can run the script like as follows.

First, decrypt the snapshot file:

```
> python .\pulse-meter.py decrypt .\pulsesecure-state-admin-localhost2-7-20240115-193030.encrypted --key <key>
2025-01-14 12:27:32,120 - DEBUG - Decrypted Snapshot
2025-01-14 12:27:32,372 - INFO - Decrypted snapshot file written to: .\pulsesecure-state-admin-localhost2-7-20240115-193030.decrypted
```

Then run the parser:

```
> python .\pulse-meter.py parse .\pulsesecure-state-admin-localhost2-7-20240115-193030.decrypted  
2025-01-14 12:28:49,045 - INFO - Parsing snapshot file: .\pulsesecure-state-admin-localhost2-7-20240115-193030.decrypted
2025-01-14 12:28:49,229 - CRITICAL - [Yara IOC] Rule: SPAWN_Malware_Family (Detects artifacts related to the SPAWN Malware Family), Reference: https://www.mandiant.com/resources/blog/suspected-apt-targets-ivanti-zero-day
```

### References

* https://www.volexity.com/blog/2024/01/10/active-exploitation-of-two-zero-day-vulnerabilities-in-ivanti-connect-secure-vpn/
* https://www.mandiant.com/resources/blog/suspected-apt-targets-ivanti-zero-day
* https://forums.ivanti.com/s/article/CVE-2023-46805-Authentication-Bypass-CVE-2024-21887-Command-Injection-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure-Gateways?language=en_US
* https://forums.ivanti.com/s/article/KB-CVE-2023-46805-Authentication-Bypass-CVE-2024-21887-Command-Injection-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure-Gateways?language=en_US
* https://attackerkb.com/topics/AdUh6by52K/cve-2023-46805/rapid7-analysis
* https://www.volexity.com/blog/2024/01/10/active-exploitation-of-two-zero-day-vulnerabilities-in-ivanti-connect-secure-vpn/
文件快照

[4.0K] /data/pocs/a6b9521525abc9847d37171a73ecf5d4720441f7 ├── [7.0K] pulse-meter.py ├── [2.7K] README.md ├── [ 118] requirements.txt └── [4.0K] yara ├── [ 336] ivanti_ict.yar ├── [1.3K] mandiant_iocs.yar └── [3.5K] volexity_iocs.yar 1 directory, 6 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。