Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Path: blob/master/documentation/modules/auxiliary/admin/http/ivanti_vtm_admin.md
Views: 11788
Vulnerable Application
This module exploits an access control issue in Ivanti Virtual Traffic Manager (vTM), by adding a new administrative user to the web interface of the application.
Affected versions include:
22.7R1
22.6R1
22.5R1
22.3R2
22.3
22.2
The vendor published an advisory [here] (https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Virtual-Traffic-Manager-vTM-CVE-2024-7593?language=en_US).
A proof-of-concept is available here.
Testing
Docker images with the software are available from here.
Successfully tested on
22.7R1 on Ubuntu 20.04.6 LTS
22.6R1 on Ubuntu 20.04.6 LTS
22.5R1 on Ubuntu 20.04.6 LTS
22.3R1 on Ubuntu 20.04.5 LTS
22.2 on Ubuntu 20.04.4 LTS
Verification Steps
Deploy Ivanti Virtual Traffic Manager (vTM)
Start
msfconsole
use auxiliary/admin/http/ivanti_vtm_admin
set RHOSTS <IP>
run
A new admin user should have been added to the web interface.
Options
NEW_USERNAME
Username to be used when creating a new user with admin privileges.
NEW_PASSWORD
Password to be used when creating a new user with admin privileges.
Scenarios
Running the module against Virtual Traffic Manager (vTM) 22.7R1 should result in an output similar to the following: