mirror of
https://github.com/0xMarcio/cve.git
synced 2025-11-28 18:48:49 +00:00
31 lines
1.4 KiB
Markdown
31 lines
1.4 KiB
Markdown
### [CVE-2024-21893](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21893)
|
|

|
|

|
|

|
|

|
|
|
|
### Description
|
|
|
|
A server-side request forgery vulnerability in the SAML component of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x) and Ivanti Neurons for ZTA allows an attacker to access certain restricted resources without authentication.
|
|
|
|
### POC
|
|
|
|
#### Reference
|
|
No PoCs from references.
|
|
|
|
#### Github
|
|
- https://github.com/Chocapikk/CVE-2024-21893-to-CVE-2024-21887
|
|
- https://github.com/GhostTroops/TOP
|
|
- https://github.com/H4lo/awesome-IoT-security-article
|
|
- https://github.com/Ostorlab/KEV
|
|
- https://github.com/afonsovitorio/cve_sandbox
|
|
- https://github.com/farukokutan/Threat-Intelligence-Research-Reports
|
|
- https://github.com/gobysec/Goby
|
|
- https://github.com/h4x0r-dz/CVE-2024-21893.py
|
|
- https://github.com/inguardians/ivanti-VPN-issues-2024-research
|
|
- https://github.com/nomi-sec/PoC-in-GitHub
|
|
- https://github.com/seajaysec/Ivanti-Connect-Around-Scan
|
|
- https://github.com/tanjiti/sec_profile
|
|
- https://github.com/toxyl/lscve
|
|
|