cve/2024/CVE-2024-22024.md
2025-09-29 16:08:36 +00:00

41 lines
1.7 KiB
Markdown

### [CVE-2024-22024](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22024)
![](https://img.shields.io/static/v1?label=Product&message=ICS&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=IPS&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=9.1R15.3%3C%209.1R15.3%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
An XML external entity or XXE vulnerability in the SAML component of Ivanti Connect Secure (9.x, 22.x), Ivanti Policy Secure (9.x, 22.x) and ZTA gateways which allows an attacker to access certain restricted resources without authentication.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/0dteam/CVE-2024-22024
- https://github.com/12442RF/POC
- https://github.com/ARPSyndicate/cve-scores
- https://github.com/DMW11525708/wiki
- https://github.com/Lern0n/Lernon-POC
- https://github.com/Lester1968/evaluacion-informes-ciberseguridad
- https://github.com/Linxloop/fork_POC
- https://github.com/Ostorlab/KEV
- https://github.com/adysec/POC
- https://github.com/cisp-pte/POC-20241008-sec-fork
- https://github.com/eeeeeeeeee-code/POC
- https://github.com/fkie-cad/nvd-json-data-feeds
- https://github.com/greenberglinken/2023hvv_1
- https://github.com/iemotion/POC
- https://github.com/inguardians/ivanti-VPN-issues-2024-research
- https://github.com/labesterOct/CVE-2024-22024
- https://github.com/laoa1573/wy876
- https://github.com/netlas-io/netlas-dorks
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/oLy0/Vulnerability
- https://github.com/opendr-io/causality
- https://github.com/plbplbp/loudong001
- https://github.com/tequilasunsh1ne/ivanti_CVE_2024_22024