Skip to content

Latest commit

 

History

History
27 lines (17 loc) · 1.19 KB

README.md

File metadata and controls

27 lines (17 loc) · 1.19 KB
Author CVE ID Product Credit
D4mianWayne
CVE-2024-37397
Ivanti Endpoint Manager
06fe5fd2bc53027c4a3b7e395af0b850e7b8a044 (Trend Micro)

Description:

A vulnerability in Ivanti Endpoint Manager allows remote attackers to disclose sensitive information without requiring authentication. This flaw arises from improper handling of XML External Entity (XXE) references in the ImportXml method. Specifically, the vulnerability is triggered by the actionXml parameter, which is processed during the execution of the SetActionStatus action via a SOAP request.

POC Showcase of CVE 2024-37397

Note: Although a valid historyEntryIDN is necessary for exploitation, it is predictable and falls within a certain range, making it possible to brute-force.

A detailed blog post will be released soon.

Patch

In the patched version, XmlResolver was marked as null effectively remediating the XXE vulnerability in the affected function.

References: