From 6c3ccd1e78bda9f364d6acafbcaf0570f8f833dc Mon Sep 17 00:00:00 2001 From: Goby <50955360+gobysec@users.noreply.github.com> Date: Tue, 6 Feb 2024 11:38:13 +0800 Subject: [PATCH] Create Ivanti_Connect_Secure_and_Policy_Secure_saml20.ws_server-side_request_forgery_vulnerability_(CVE-2024-21893).md --- ...equest_forgery_vulnerability_(CVE-2024-21893).md | 13 +++++++++++++ 1 file changed, 13 insertions(+) create mode 100644 Ivanti_Connect_Secure_and_Policy_Secure_saml20.ws_server-side_request_forgery_vulnerability_(CVE-2024-21893).md diff --git a/Ivanti_Connect_Secure_and_Policy_Secure_saml20.ws_server-side_request_forgery_vulnerability_(CVE-2024-21893).md b/Ivanti_Connect_Secure_and_Policy_Secure_saml20.ws_server-side_request_forgery_vulnerability_(CVE-2024-21893).md new file mode 100644 index 0000000..374de70 --- /dev/null +++ b/Ivanti_Connect_Secure_and_Policy_Secure_saml20.ws_server-side_request_forgery_vulnerability_(CVE-2024-21893).md @@ -0,0 +1,13 @@ + +## Ivanti Connect Secure and Policy Secure saml20.ws server-side request forgery vulnerability (CVE-2024-21893) + +| **Vulnerability** | Ivanti Connect Secure and Policy Secure saml20.ws server-side request forgery vulnerability (CVE-2024-21893) | +| :----: | :-----| +| **Chinese name** | JIvanti Connect Secure 和 Policy Secure saml20.ws 服务端请求伪造漏洞(CVE-2024-21893) | +| **CVSS core** | 8.2 | +| **FOFA Query** (click to view the results directly)| [app="PulseSecure-SSL-VPN"](https://en.fofa.info/result?qbase64=aGVhZGVyPSJEU0Jyb3dzZXJJRCIgfHwgYmFubmVyPSJEU0Jyb3dzZXJJRCIgfHwgYm9keT0iL2RhbmEtbmEvO2V4cGlyZXM9IiB8fCBib2R5PSJkYW5hLWNhY2hlZC9pbWdzL3NwYWNlLmdpZiIgfHwgYm9keT0iL2RhbmEtbmEvaW1ncy9zcGFjZS5naWYiIHx8IGJvZHk9Ii9kYW5hLW5hL2ltZ3MvUHJvZHVjdF9mYXZpY29uLnBuZyIgfHwgYm9keT0iL2RhbmEtbmEvaW1ncy9JdmFudGlfZmF2aWNvbi5wbmciIHx8IGJvZHk9Ii9kYW5hLW5hL2Nzcy9kcy5qcyIgfHwgYm9keT0iZHNfbW9iaWxlX3NhZmFyaS5jc3MiIHx8IGJvZHk9IndlbGNvbWUuY2dpP3A9bG9nbyZzaWduaW5JZD11cmxfZGVmYXVsdCIgfHwgYm9keT0iPGI%2BUHVsc2UgQ29ubmVjdCBTZWN1cmU8L2I%2BIiB8fCB0aXRsZT0iU2VjdXJlIEFjY2VzcyBTU0wgVlBOIiB8fCBiYW5uZXI9Ii9kYW5hLW5hL2F1dGgvdXJsX2RlZmF1bHQiIHx8IGhlYWRlcj0iL2RhbmEtbmEvYXV0aC91cmxfZGVmYXVsdCIgfHwgYm9keT0ic3JjPVwiL2RhbmEtbmEvYXV0aC8i)| +| **Number of assets affected** | 399547 | +| **Description** | Ivanti Connect/Policy Secure is a secure remote network connection tool from the American company Ivanti.Ivanti Connect Secure product saml20.ws has a server-side request forgery vulnerability. An attacker can use this vulnerability to read important system files (such as database configuration files, system configuration files), database configuration files, etc., causing the website to be in an extremely unsafe state. | +| **Impact** | Ivanti Connect Secure product saml20.ws has a server-side request forgery vulnerability. An attacker can use this vulnerability to read important system files (such as database configuration files, system configuration files), database configuration files, etc., causing the website to be in an extremely unsafe state. | + +![](https://s3.bmp.ovh/imgs/2024/02/06/b02b7373188c6998.gif).