-
Notifications
You must be signed in to change notification settings - Fork 14.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Ivanti Virtual Traffic Manager (vTM) Authentication Bypass (CVE-2024-7593) Module #19386
Conversation
Auth Bypass
references, affected versions, credits
Verified exploit against more affected versions
Successfully verified the MSF module against more affected versions:
|
Improved error handling
Woops looks like my suggestion broke the linter. Seems this is the issue:
I imagine this is the correct line then: if res && res.code == 302 && res.get_cookies.include?('ZeusTMZAUTH_') |
Fixed get_cookies
code cleanup
|
Release NotesAdds an exploit targeting CVE-2024-7593, an improper access control vulnerability in Ivanti Virtual Traffic Manager (vTM) . It allows an unauthenticated remote attacker to add a new administrative user to the web interface of the product before 22.7R2. |
This is a new module which exploits an improper access control vulnerability (CVE-2024-7593) in Ivanti Virtual Traffic Manager (vTM). It allows an unauthenticated remote attacker to add a new administrative user to the web interface of the product.
Affected versions include:
Verification Steps
msfconsole
use auxiliary/admin/http/ivanti_vtm_admin
set RHOSTS <IP>
run
A new administrative user should have been added to the web interface of the product.
Successfully tested on