forked from rapid7/metasploit-framework
-
Notifications
You must be signed in to change notification settings - Fork 1
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge remote-tracking branch 'upstream/master'
- Loading branch information
Showing
14 changed files
with
447 additions
and
128 deletions.
There are no files selected for viewing
File renamed without changes.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
65 changes: 65 additions & 0 deletions
65
documentation/modules/auxiliary/admin/http/ivanti_vtm_admin.md
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,65 @@ | ||
## Vulnerable Application | ||
|
||
This module exploits an access control issue in Ivanti Virtual Traffic Manager (vTM), by adding a new | ||
administrative user to the web interface of the application. | ||
|
||
Affected versions include: | ||
* 22.7R1 | ||
* 22.6R1 | ||
* 22.5R1 | ||
* 22.3R2 | ||
* 22.3 | ||
* 22.2 | ||
|
||
The vendor published an advisory [here] | ||
(https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Virtual-Traffic-Manager-vTM-CVE-2024-7593?language=en_US). | ||
|
||
A proof-of-concept is available [here](https://packetstormsecurity.com/files/179906). | ||
|
||
## Testing | ||
|
||
Docker images with the software are available from [here](https://hubgw.docker.com/r/pulsesecure/vtm). | ||
|
||
**Successfully tested on** | ||
|
||
- 22.7R1 on Ubuntu 20.04.6 LTS | ||
- 22.6R1 on Ubuntu 20.04.6 LTS | ||
- 22.5R1 on Ubuntu 20.04.6 LTS | ||
- 22.3R1 on Ubuntu 20.04.5 LTS | ||
- 22.2 on Ubuntu 20.04.4 LTS | ||
|
||
## Verification Steps | ||
|
||
1. Deploy Ivanti Virtual Traffic Manager (vTM) | ||
2. Start `msfconsole` | ||
3. `use auxiliary/admin/http/ivanti_vtm_admin` | ||
4. `set RHOSTS <IP>` | ||
5. `run` | ||
6. A new admin user should have been added to the web interface. | ||
|
||
## Options | ||
|
||
### NEW_USERNAME | ||
Username to be used when creating a new user with admin privileges. | ||
|
||
### NEW_PASSWORD | ||
Password to be used when creating a new user with admin privileges. | ||
|
||
## Scenarios | ||
|
||
Running the module against Virtual Traffic Manager (vTM) 22.7R1 should result in an output | ||
similar to the following: | ||
|
||
``` | ||
msf6 > use auxiliary/admin/http/ivanti_vtm_admin | ||
msf6 auxiliary(admin/http/ivanti_vtm_admin) > set RHOSTS 172.17.0.2 | ||
msf6 auxiliary(admin/http/ivanti_vtm_admin) > exploit | ||
[*] Running module against 172.17.0.2 | ||
[*] Running automatic check ("set AutoCheck false" to disable) | ||
[+] The target appears to be vulnerable. Version: 22.7R1 | ||
[+] New admin user was successfully added: | ||
h4x0r:w00Tw00T! | ||
[+] Login at: https://172.17.0.2:9090/apps/zxtm/login.cgi | ||
[*] Auxiliary module execution completed | ||
``` |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Oops, something went wrong.