cve/2024/CVE-2024-13159.md

28 lines
1.2 KiB
Markdown
Raw Normal View History

2025-09-29 16:08:36 +00:00
### [CVE-2024-13159](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-13159)
![](https://img.shields.io/static/v1?label=Product&message=Endpoint%20Manager&color=blue)
2025-09-29 21:09:30 +02:00
![](https://img.shields.io/static/v1?label=Version&message=&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-36%20Absolute%20Path%20Traversal&color=brightgreen)
2025-09-29 16:08:36 +00:00
### Description
Absolute path traversal in Ivanti EPM before the 2024 January-2025 Security Update and 2022 SU6 January-2025 Security Update allows a remote unauthenticated attacker to leak sensitive information.
### POC
#### Reference
2025-09-29 21:09:30 +02:00
- https://www.horizon3.ai/attack-research/attack-blogs/ivanti-endpoint-manager-multiple-credential-coercion-vulnerabilities/
2025-09-29 16:08:36 +00:00
#### Github
2025-09-29 21:09:30 +02:00
- https://github.com/20142995/nuclei-templates
2025-09-29 16:08:36 +00:00
- https://github.com/Ostorlab/KEV
2025-09-29 21:09:30 +02:00
- https://github.com/cyb3r-w0lf/nuclei-template-collection
- https://github.com/cyberdyne-ventures/predictions
2025-09-29 16:08:36 +00:00
- https://github.com/hogehuga/cveTreage
- https://github.com/horizon3ai/Ivanti-EPM-Coercion-Vulnerabilities
2025-09-29 21:09:30 +02:00
- https://github.com/nomi-sec/PoC-in-GitHub
2025-09-29 16:08:36 +00:00
- https://github.com/opendr-io/causality
- https://github.com/packetinside/CISA_BOT
- https://github.com/plzheheplztrying/cve_monitor
2025-09-29 21:09:30 +02:00
- https://github.com/ums91/CISA_BOT
2025-09-29 16:08:36 +00:00