mirror of
https://github.com/gobysec/GobyVuls.git
synced 2025-05-06 10:41:40 +00:00
Update GobyVuls-Document.md
This commit is contained in:
parent
f470254560
commit
360451c7a8
@ -1,7 +1,25 @@
|
||||
# Goby History Update Vulnerability Total Document (Continuously Update)
|
||||
The following content is an updated vulnerability from Goby. Some of the vulnerabilities are recorded on the screen for easy viewing.
|
||||
|
||||
**Updated document date: December 28, 2023**
|
||||
**Updated document date: January 18, 2024**
|
||||
|
||||
|
||||
## Ivanti Connect Secure and Policy Secure keys-status remote command execution vulnerability (CVE-2023-46805/CVE-2024-21887)
|
||||
|
||||
| **Vulnerability** | Ivanti Connect Secure and Policy Secure keys-status remote command execution vulnerability (CVE-2023-46805/CVE-2024-21887) |
|
||||
| :----: | :-----|
|
||||
| **Chinese name** | Ivanti Connect Secure 和 Policy Secure keys-status 远程命令执行漏洞(CVE-2023-46805/CVE-2024-21887) |
|
||||
| **CVSS core** | 9.1 |
|
||||
| **FOFA Query** (click to view the results directly)| [app="Ivanti Connect Secure"](https://en.fofa.info/result?qbase64=aGVhZGVyPSJEU0Jyb3dzZXJJRCIgfHwgYmFubmVyPSJEU0Jyb3dzZXJJRCIgfHwgYm9keT0iL2RhbmEtbmEvO2V4cGlyZXM9IiB8fCBib2R5PSJkYW5hLWNhY2hlZC9pbWdzL3NwYWNlLmdpZiIgfHwgYm9keT0iL2RhbmEtbmEvaW1ncy9zcGFjZS5naWYiIHx8IGJvZHk9Ii9kYW5hLW5hL2ltZ3MvUHJvZHVjdF9mYXZpY29uLnBuZyIgfHwgYm9keT0iL2RhbmEtbmEvaW1ncy9JdmFudGlfZmF2aWNvbi5wbmciIHx8IGJvZHk9Ii9kYW5hLW5hL2Nzcy9kcy5qcyIgfHwgYm9keT0iZHNfbW9iaWxlX3NhZmFyaS5jc3MiIHx8IGJvZHk9IndlbGNvbWUuY2dpP3A9bG9nbyZzaWduaW5JZD11cmxfZGVmYXVsdCI%3D)|
|
||||
| **Number of assets affected** | 154590 |
|
||||
| **Description** | Ivanti is a software and information technology services company focused on providing solutions for IT management, security, service management and endpoint management. Ivanti Connect Secure and Ivanti Policy Secure are part of two security solutions from Ivanti for network security and connectivity management.There is a command injection vulnerability in the web component of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x). The authentication bypass vulnerability and the command injection vulnerability can be used to send specially crafted requests and Execute arbitrary commands on the device. |
|
||||
| **Impact** | which utilizes authentication to bypass the vulnerability and in combination with command injection vulnerabilities, can send customized requests and execute arbitrary commands on the device, gain server privileges, and thus control the entire web server. |
|
||||
|
||||

|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
## Apache OFBiz webtools/control/ProgramExport remote code execution vulnerability (CVE-2023-51467)
|
||||
|
Loading…
x
Reference in New Issue
Block a user