关联漏洞
描述
CVE-2023-38035 Recon oriented exploit, extract company name contact information
介绍
# MobileIron Sentry CVE-2023-38035 information extraction
## Features
- Extract company name and contact email
- Proof of vulnerability
## Usage
```sh
./sentryexploit 192.168.0.10:8443
2023/08/24 21:29:55 Information extracted, appliance is vulnerable:
2023/08/24 21:29:55 Company: XXXX Ltd., contact: xxx@example.com
```
## Sources
- [Horizon3 deep dive](https://www.horizon3.ai/ivanti-sentry-authentication-bypass-cve-2023-38035-deep-dive/)
文件快照
[4.0K] /data/pocs/b7bfd2da3866b4a6b3594a6613601b3a2aac0616
├── [ 294] go.mod
├── [ 67K] go.sum
├── [1.2K] main.go
└── [ 449] README.md
0 directories, 4 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。