Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-21887 PoC — Ivanti Connect Secure 命令注入漏洞

Source
Associated Vulnerability
Title:Ivanti Connect Secure 命令注入漏洞 (CVE-2024-21887)
Description:Ivanti Connect Secure是美国Ivanti公司的安全远程网络连接工具。 Ivanti Connect Secure 9.x、22.x系列版本、 Ivanti Policy Secure 9.x、22.x系列版本存在命令注入漏洞,该漏洞源于Web 组件中存在命令注入,允许经过身份验证的管理员发送特制请求并在设备上执行任意命令。
Description
A command injection vulnerability in web components of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x) allows an authenticated administrator to send specially crafted requests and execute arbitrary commands on the appliance.
Readme
# 🚨 CVE-2024-21887 Exploit Tool 🛠️

A robust tool for detecting and exploiting the CVE-2024-21887 vulnerability in Ivanti Connect and Policy Secure systems.

## 📝 Description

CVE-2024-21887 is a critical command injection vulnerability, allowing authenticated admins to execute arbitrary commands. This tool aids in identifying and interacting with affected systems.

## 🚀 Features

- **Single URL Scan**: Pinpoint focus on a single target.
- **Bulk Scanning**: Analyze multiple URLs from a file.
- **Thread Control**: Customize concurrent scanning with thread options.
- **Output Logging**: Save identified vulnerable URLs to a file.

## 📚 How to Use

1. Install dependencies: `pip install -r requirements.txt`
2. Run the tool:
   - Single URL: `python exploit.py -u <URL>`
   - Bulk scan: `python exploit.py -f <file-path>`
   - With threads: `python exploit.py -f <file-path> -t <number-of-threads>`
   - Save output: `python exploit.py -f <file-path> -o <output-file-path>`

⚠️ **Disclaimer**: This tool is provided for educational and ethical testing purposes only. I am not responsible for any misuse or damage caused by this tool. Always obtain explicit permission before testing systems that you do not own or have explicit authorization to test.
File Snapshot

[4.0K] /data/pocs/d4a088c7dd7e2610a5decbafedccb0bf3dbd935a ├── [4.5K] exploit.py ├── [1.2K] README.md └── [ 92] requirements.txt 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.