Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-38035 PoC — Mobileiron MobileIron Sentry 安全漏洞

Source
Associated Vulnerability
Title:Mobileiron MobileIron Sentry 安全漏洞 (CVE-2023-38035)
Description:A security vulnerability in MICS Admin Portal in Ivanti MobileIron Sentry versions 9.18.0 and below, which may allow an attacker to bypass authentication controls on the administrative interface due to an insufficiently restrictive Apache HTTPD configuration.
Description
Script to exploit CVE-2023-38035
Readme
# MobileIron CVE-2023-38035 Exploit README.md
## Description 
This bash script automates the process of scanning for vulnerable MobileIron systems that are susceptible to the CVE-2023-38035 exploit. The script performs multiple checks, including checking for required programs, downloading potential targets from Shodan, scanning these targets, and finally attempting to spawn a shell on a vulnerable system.

## Features
- Automated Shodan query to find vulnerable MobileIron Systems
- Extracts IP addresses for scanning
- Automated vulnerability assessment of targets
- Gives an option to execute reverse shell using different methods like ncat or multi_reverse.sh
- Checks for missing dependencies and recommends installation
- Beautiful banner to make the tool look cool 😎

## Requirements
The following programs/packages are required for this script to work:

- shodan: Shodan CLI tool and API Key
- jq: Lightweight and flexible command-line JSON processor
- python: Python3
- ngrok: To expose a local server behind a NAT or firewall to the Internet
- terminator: For managing multiple terminal windows

Ensure that you have properly configured Shodan and Ngrok.

## Installations steps
1. Clone this repository
```bash
git clone <repository-url>
```
2. Navigate to the repository
```bash
cd <project-directory>
```
3. Make the script executable
```bash
chmod +x mics_hunter.sh
```
4. Run the script
```bash
./mics_hunter.sh
```

## Usage
Just run the script, and it will perform all the tasks sequentially:
1. Check for required programs.
2. Download Shodan search results.
3. Scan the potential targets.
4. Allow you to select a target and method for reverse shell execution.

## External Dependencies
This script uses an external tool `hessian.py` to serialization of data. Make sure you have it in the same directory as this script.

## Credits for hessian.py
This script uses `hessian.py` which is a modified version of a script created by [horizon3ai](https://github.com/horizon3ai/CVE-2023-38035). 

## Disclaimer
This script is for educational purposes only. The use of this script for any malicious activities is prohibited.

## Contributing
Pull requests are welcome. For major changes, please open an issue first to discuss what you would like to change.

## License
GPLv3

## Author
- mind2hex

Feel free to reach out to me if you have any questions or issues!
File Snapshot

[4.0K] /data/pocs/de89da55e8a166c96223ed329189f83f1b82b5d4 ├── [1.1K] hessian.py ├── [ 34K] LICENSE ├── [ 13K] mics_hunter.sh └── [2.3K] README.md 0 directories, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →