Skip to content

PoC for CVE-2024-7593 Ivanti Virtual Traffic Manager 22.2R1 / 22.7R2 Admin Panel Authentication Bypass

GitHub: https://github.com/D3N14LD15K/CVE-2024-7593_PoC_Exploit
Last Commit: September 25th, 2024


CVE-2024-7593 Exploit Script

This Bash script serves as a proof of concept (PoC) for exploiting the authentication bypass vulnerability in Ivanti vTM (CVE-2024-7593). It allows users to create a new admin user on the target system.

Table of Contents

Prerequisites

Make sure you have the following installed on your system:

  • curl: This script uses curl to send HTTP requests.

You can check if curl is installed by running:

bash command -v curl

If it's not installed, you can install it using your package manager. For example, on Ubuntu:

sudo apt-get install curl

Usage

To run the script, change permissions to +x and use the following command:

./CVE-2024-7593.sh -u <host> -p <port>

<host>: The target host (e.g., example.com).

<port>: The target port (e.g., 9090).

Example

./CVE-2024-7593.sh -u example.com -p 9090

Response Handling

If the new user is successfully created, the script will display the login credentials. If the user creation fails, it will inform you of the failure.

Author

D3N14LD15K   :::   D3N14LD15K[at]BUGCROWDNINJA.COM   :::   X.COM/D3N14LD15K

Disclaimer

This proof of concept is for educational purposes only. You are responsible for your own use of this script.

Latest