Skip to content

Commit

Permalink
Merge pull request #786 from jimmy-ly00/master
Browse files Browse the repository at this point in the history
New Module: Added Ivanti ICS CVE-2023-46805 Vuln
  • Loading branch information
securestep9 authored Jan 18, 2024
2 parents 90af15d + 121bdf8 commit cfa711f
Showing 1 changed file with 51 additions and 0 deletions.
51 changes: 51 additions & 0 deletions modules/vuln/ivanti_ics_cve_2023_46805.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,51 @@
info:
name: ivanti_ics_cve_2023_46805_vuln
author: Jimmy Ly
severity: 8.2
description: CVE-2023-46805 is an authentication bypass that is usually chained with CVE-2024-21887 to perform remote code execution on Ivanti ICS 9.x, 22.x. This module checks whether the mitigations have been applied for CVE-2023-46805.
reference:
- https://forums.ivanti.com/s/article/CVE-2023-46805-Authentication-Bypass-CVE-2024-21887-Command-Injection-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure-Gateways?language=en_US
- https://labs.watchtowr.com/welcome-to-2024-the-sslvpn-chaos-continues-ivanti-cve-2023-46805-cve-2024-21887
profiles:
- vuln
- vulnerability
- http
- high_severity
- cve
- ivanti
- ivanti_connect_secure
- invati_ics

payloads:
- library: http
steps:
- method: get
timeout: 3
headers:
User-Agent: "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/112.0.5615.138 Safari/537.36"
allow_redirects: false
ssl: false
url:
nettacker_fuzzer:
input_format: "{{schema}}://{target}:{{ports}}/{{paths}}"
prefix: ""
suffix: ""
interceptors:
data:
paths:
- "api/v1/configuration/users/user-roles/user-role/rest-userrole1/web/web-bookmarks/bookmark"
schema:
- "http"
- "https"
ports:
- 80
- 443
response:
condition_type: and
conditions:
status_code:
regex: '403'
reverse: false
content:
regex: '<html>'
reverse: true

0 comments on commit cfa711f

Please sign in to comment.