Entreprise d'experts en Sécurité Informatique : Audits et conseils en cybersécurité
Entreprise française de cybersécurité depuis 2004
☎ 03 60 47 09 81 - info@securiteinfo.com


CVE-2024-21887

Description

A command injection vulnerability in web components of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x) allows an authenticated administrator to send specially crafted requests and execute arbitrary commands on the appliance.

POC

Reference

- http://packetstormsecurity.com/files/176668/Ivanti-Connect-Secure-Unauthenticated-Remote-Code-Execution.html

Github

- https://github.com/0day404/HV-2024-POC

- https://github.com/0xAj-Krishna/biggest-hack

- https://github.com/0xAj-Krishna/biggest-hack-2023-24

- https://github.com/12442RF/POC

- https://github.com/20142995/sectool

- https://github.com/ARPSyndicate/cve-scores

- https://github.com/AboSteam/POPC

- https://github.com/Chocapikk/CVE-2024-21887

- https://github.com/Chocapikk/CVE-2024-21893-to-CVE-2024-21887

- https://github.com/DMW11525708/wiki

- https://github.com/GhostTroops/TOP

- https://github.com/H4lo/awesome-IoT-security-article

- https://github.com/Hexastrike/Ivanti-Connect-Secure-Logs-Parser

- https://github.com/Hexastrike/Ivanti-Secure-Connect-Logs-Parser

- https://github.com/HiS3/Ivanti-ICT-Snapshot-decryption

- https://github.com/JanRooduijn/pgadmin4-REL-6_16

- https://github.com/JanRooduijn/tutorial-radboud

- https://github.com/Lern0n/Lernon-POC

- https://github.com/Linxloop/fork_POC

- https://github.com/Marco-zcl/POC

- https://github.com/Mr-xn/Penetration_Testing_POC

- https://github.com/Ostorlab/KEV

- https://github.com/TheRedDevil1/Check-Vulns-Script

- https://github.com/Warren-Jace/poc-doc

- https://github.com/WhosGa/MyWiki

- https://github.com/Yuan08o/pocs

- https://github.com/admin772/POC

- https://github.com/adminlove520/pocWiki

- https://github.com/adysec/POC

- https://github.com/awslabs/Chatbot-to-help-security-teams-perform-vulnerability-assessments

- https://github.com/cisp-pte/POC-20241008-sec-fork

- https://github.com/d4n-sec/d4n-sec.github.io

- https://github.com/duy-31/CVE-2023-46805_CVE-2024-21887

- https://github.com/eeeeeeeeee-code/POC

- https://github.com/emo-crab/attackerkb-api-rs

- https://github.com/farukokutan/Threat-Intelligence-Research-Reports

- https://github.com/fkie-cad/nvd-json-data-feeds

- https://github.com/gobysec/Goby

- https://github.com/greenberglinken/2023hvv_1

- https://github.com/iemotion/POC

- https://github.com/imhunterand/CVE-2024-21887

- https://github.com/inguardians/ivanti-VPN-issues-2024-research

- https://github.com/jake-44/Research

- https://github.com/jamesfed/0DayMitigations

- https://github.com/jaredfolkins/5min-cyber-notes

- https://github.com/laoa1573/wy876

- https://github.com/lions2012/Penetration_Testing_POC

- https://github.com/mickdec/CVE-2023-46805_CVE-2024-21887_scan_grouped

- https://github.com/mikhirurg/tutorial-radboud

- https://github.com/nomi-sec/PoC-in-GitHub

- https://github.com/oLy0/Vulnerability

- https://github.com/oways/ivanti-CVE-2024-21887

- https://github.com/plzheheplztrying/cve_monitor

- https://github.com/raminkarimkhani1996/CVE-2023-46805_CVE-2024-21887

- https://github.com/rxwx/pulse-meter

- https://github.com/seajaysec/Ivanti-Connect-Around-Scan

- https://github.com/stephen-murcott/Ivanti-ICT-Snapshot-decryption

- https://github.com/tanjiti/sec_profile

- https://github.com/toxyl/lscve

- https://github.com/tucommenceapousser/CVE-2024-21887

- https://github.com/wjlin0/poc-doc

- https://github.com/wooluo/POC00

- https://github.com/wy876/POC

- https://github.com/wy876/wiki

- https://github.com/xingchennb/POC-

- https://github.com/yoryio/CVE-2023-46805