Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-35082 PoC — Ivanti EPMM 授权问题漏洞

Source
Associated Vulnerability
Title:Ivanti EPMM 授权问题漏洞 (CVE-2023-35082)
Description:An authentication bypass vulnerability in Ivanti EPMM 11.10 and older, allows unauthorized users to access restricted functionality or resources of the application without proper authentication. This vulnerability is unique to CVE-2023-35078 announced earlier.
Description
Remote Unauthenticated API Access Vulnerability in MobileIron Core 11.2 and older
Readme
# 🕵️ Vulnerability Scanner 🛡️

This Python script helps you scan websites for specific vulnerabilities and fetches information regarding authorized users.

## 📌 Features

- Scans URLs for known vulnerabilities (CVE-2023-35082, CVE-2023-35078).
- Retrieves and prints the first 10 email addresses, display names, last login IPs, and roles.
- Supports mass scanning through a file containing a list of URLs.
- Can output results to a file.

## 🔧 How to Use

1. Clone the repository or download the script.
2. Install the required dependencies:

   ```bash
   pip install -r requirements.txt
   ```

3. Run the script with the desired options:

   - Single URL:

     ```bash
     python exploit.py -u <URL> --verbose
     ```

   - Multiple URLs from a file:

     ```bash
     python exploit.py -f <file.txt> --verbose
     ```

   - Save output to a file:

     ```bash
     python exploit.py -u <URL> -o <output_file.txt>
     ```

## 🎓 Parameters

- `-u, --url`: Base URL for the request.
- `-f, --file`: File containing a list of URLs for mass scanning.
- `-o, --output`: Output file to save vulnerable URLs and first 5 emails.
- `--verbose`: Verbose mode (optional).

## 🛑 Disclaimer

Please use this script responsibly and only on websites that you have the proper authorization to scan. Unauthorized scanning may lead to legal issues.


File Snapshot

[4.0K] /data/pocs/0dce39a889c412627bc4a384acd7f69450d0d962 ├── [5.6K] exploit.py ├── [1.3K] README.md └── [ 69] requirements.txt 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →