mirror of
https://github.com/0xMarcio/cve.git
synced 2025-11-28 18:48:49 +00:00
78 lines
3.6 KiB
Markdown
78 lines
3.6 KiB
Markdown
### [CVE-2024-21887](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21887)
|
|

|
|

|
|

|
|

|
|
|
|
### Description
|
|
|
|
A command injection vulnerability in web components of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x) allows an authenticated administrator to send specially crafted requests and execute arbitrary commands on the appliance.
|
|
|
|
### POC
|
|
|
|
#### Reference
|
|
- http://packetstormsecurity.com/files/176668/Ivanti-Connect-Secure-Unauthenticated-Remote-Code-Execution.html
|
|
|
|
#### Github
|
|
- https://github.com/0day404/HV-2024-POC
|
|
- https://github.com/0xAj-Krishna/biggest-hack
|
|
- https://github.com/12442RF/POC
|
|
- https://github.com/20142995/sectool
|
|
- https://github.com/AboSteam/POPC
|
|
- https://github.com/Chocapikk/CVE-2024-21887
|
|
- https://github.com/Chocapikk/CVE-2024-21893-to-CVE-2024-21887
|
|
- https://github.com/DMW11525708/wiki
|
|
- https://github.com/GhostTroops/TOP
|
|
- https://github.com/H4lo/awesome-IoT-security-article
|
|
- https://github.com/Hexastrike/Ivanti-Connect-Secure-Logs-Parser
|
|
- https://github.com/HiS3/Ivanti-ICT-Snapshot-decryption
|
|
- https://github.com/JanRooduijn/pgadmin4-REL-6_16
|
|
- https://github.com/Lern0n/Lernon-POC
|
|
- https://github.com/Linxloop/fork_POC
|
|
- https://github.com/Marco-zcl/POC
|
|
- https://github.com/Mr-xn/Penetration_Testing_POC
|
|
- https://github.com/Ostorlab/KEV
|
|
- https://github.com/TheRedDevil1/Check-Vulns-Script
|
|
- https://github.com/WhosGa/MyWiki
|
|
- https://github.com/Yuan08o/pocs
|
|
- https://github.com/admin772/POC
|
|
- https://github.com/adminlove520/pocWiki
|
|
- https://github.com/adysec/POC
|
|
- https://github.com/awslabs/Chatbot-to-help-security-teams-perform-vulnerability-assessments
|
|
- https://github.com/cisp-pte/POC-20241008-sec-fork
|
|
- https://github.com/d4n-sec/d4n-sec.github.io
|
|
- https://github.com/duy-31/CVE-2023-46805_CVE-2024-21887
|
|
- https://github.com/eeeeeeeeee-code/POC
|
|
- https://github.com/emo-crab/attackerkb-api-rs
|
|
- https://github.com/farukokutan/Threat-Intelligence-Research-Reports
|
|
- https://github.com/fkie-cad/nvd-json-data-feeds
|
|
- https://github.com/gobysec/Goby
|
|
- https://github.com/greenberglinken/2023hvv_1
|
|
- https://github.com/iemotion/POC
|
|
- https://github.com/imhunterand/CVE-2024-21887
|
|
- https://github.com/inguardians/ivanti-VPN-issues-2024-research
|
|
- https://github.com/jake-44/Research
|
|
- https://github.com/jamesfed/0DayMitigations
|
|
- https://github.com/jaredfolkins/5min-cyber-notes
|
|
- https://github.com/laoa1573/wy876
|
|
- https://github.com/lions2012/Penetration_Testing_POC
|
|
- https://github.com/mickdec/CVE-2023-46805_CVE-2024-21887_scan_grouped
|
|
- https://github.com/mikhirurg/tutorial-radboud
|
|
- https://github.com/nomi-sec/PoC-in-GitHub
|
|
- https://github.com/oLy0/Vulnerability
|
|
- https://github.com/oways/ivanti-CVE-2024-21887
|
|
- https://github.com/plzheheplztrying/cve_monitor
|
|
- https://github.com/raminkarimkhani1996/CVE-2023-46805_CVE-2024-21887
|
|
- https://github.com/rxwx/pulse-meter
|
|
- https://github.com/seajaysec/Ivanti-Connect-Around-Scan
|
|
- https://github.com/stephen-murcott/Ivanti-ICT-Snapshot-decryption
|
|
- https://github.com/tanjiti/sec_profile
|
|
- https://github.com/toxyl/lscve
|
|
- https://github.com/tucommenceapousser/CVE-2024-21887
|
|
- https://github.com/wjlin0/poc-doc
|
|
- https://github.com/wy876/POC
|
|
- https://github.com/wy876/wiki
|
|
- https://github.com/xingchennb/POC-
|
|
- https://github.com/yoryio/CVE-2023-46805
|
|
|