Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-21887 PoC — Ivanti Connect Secure 命令注入漏洞

Source
Associated Vulnerability
Title:Ivanti Connect Secure 命令注入漏洞 (CVE-2024-21887)
Description:A command injection vulnerability in web components of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x) allows an authenticated administrator to send specially crafted requests and execute arbitrary commands on the appliance.
Description
A command injection vulnerability in web components of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x) allows an authenticated administrator to send specially crafted requests and execute arbitrary commands on the appliance.
Readme
# 🚨 CVE-2024-21887 Exploit Tool 🛠️

A robust tool for detecting and exploiting the CVE-2024-21887 vulnerability in Ivanti Connect and Policy Secure systems.

## 📝 Description

CVE-2024-21887 is a critical command injection vulnerability, allowing authenticated admins to execute arbitrary commands. This tool aids in identifying and interacting with affected systems.

## 🚀 Features

- **Single URL Scan**: Pinpoint focus on a single target.
- **Bulk Scanning**: Analyze multiple URLs from a file.
- **Thread Control**: Customize concurrent scanning with thread options.
- **Output Logging**: Save identified vulnerable URLs to a file.

## 📚 How to Use

1. Install dependencies: `pip install -r requirements.txt`
2. Run the tool:
   - Single URL: `python exploit.py -u <URL>`
   - Bulk scan: `python exploit.py -f <file-path>`
   - With threads: `python exploit.py -f <file-path> -t <number-of-threads>`
   - Save output: `python exploit.py -f <file-path> -o <output-file-path>`

⚠️ **Disclaimer**: This tool is provided for educational and ethical testing purposes only. I am not responsible for any misuse or damage caused by this tool. Always obtain explicit permission before testing systems that you do not own or have explicit authorization to test.
File Snapshot

[4.0K] /data/pocs/d4a088c7dd7e2610a5decbafedccb0bf3dbd935a ├── [4.5K] exploit.py ├── [1.2K] README.md └── [ 92] requirements.txt 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →