PoC-in-GitHub/2024/CVE-2024-21887.json

247 lines
9.1 KiB
JSON
Raw Normal View History

2024-01-14 21:39:35 +09:00
[
{
"id": 743084274,
"name": "ivanti-CVE-2024-21887",
"full_name": "oways\/ivanti-CVE-2024-21887",
"owner": {
"login": "oways",
"id": 11142952,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11142952?v=4",
"html_url": "https:\/\/github.com\/oways"
},
"html_url": "https:\/\/github.com\/oways\/ivanti-CVE-2024-21887",
"description": "POC Checker for ivanti CVE-2024-21887 Command injcetion",
"fork": false,
"created_at": "2024-01-14T09:25:56Z",
2024-01-21 15:26:46 +09:00
"updated_at": "2024-01-21T01:00:54Z",
2024-01-14 21:39:35 +09:00
"pushed_at": "2024-01-14T09:27:36Z",
2024-01-21 15:26:46 +09:00
"stargazers_count": 6,
"watchers_count": 6,
2024-01-14 21:39:35 +09:00
"has_discussions": false,
2024-01-17 15:40:17 +09:00
"forks_count": 1,
2024-01-14 21:39:35 +09:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
2024-01-17 15:40:17 +09:00
"forks": 1,
2024-01-21 15:26:46 +09:00
"watchers": 6,
2024-01-15 03:42:49 +09:00
"score": 0,
2024-01-15 15:33:00 +09:00
"subscribers_count": 1
2024-01-17 09:34:44 +09:00
},
{
"id": 744186376,
"name": "CVE-2023-46805_CVE-2024-21887",
"full_name": "duy-31\/CVE-2023-46805_CVE-2024-21887",
"owner": {
"login": "duy-31",
"id": 20819326,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20819326?v=4",
"html_url": "https:\/\/github.com\/duy-31"
},
"html_url": "https:\/\/github.com\/duy-31\/CVE-2023-46805_CVE-2024-21887",
2024-01-30 03:26:09 +09:00
"description": "An authentication bypass vulnerability in the web component of Ivanti ICS 9.x, 22.x and Ivanti Policy Secure allows a remote attacker to access restricted resources by bypassing control checks.",
2024-01-17 09:34:44 +09:00
"fork": false,
"created_at": "2024-01-16T19:40:59Z",
2024-04-10 09:28:51 +09:00
"updated_at": "2024-04-09T22:01:34Z",
2024-01-18 09:32:40 +09:00
"pushed_at": "2024-01-17T19:14:09Z",
2024-04-10 09:28:51 +09:00
"stargazers_count": 13,
"watchers_count": 13,
2024-01-17 09:34:44 +09:00
"has_discussions": false,
2024-02-21 09:26:32 +09:00
"forks_count": 3,
2024-01-17 09:34:44 +09:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
2024-02-21 09:26:32 +09:00
"forks": 3,
2024-04-10 09:28:51 +09:00
"watchers": 13,
2024-01-17 09:34:44 +09:00
"score": 0,
2024-02-19 15:26:14 +09:00
"subscribers_count": 2
2024-01-17 09:34:44 +09:00
},
{
"id": 744213825,
"name": "CVE-2024-21887",
"full_name": "Chocapikk\/CVE-2024-21887",
"owner": {
"login": "Chocapikk",
"id": 88535377,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
"html_url": "https:\/\/github.com\/Chocapikk"
},
"html_url": "https:\/\/github.com\/Chocapikk\/CVE-2024-21887",
"description": "A command injection vulnerability in web components of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x) allows an authenticated administrator to send specially crafted requests and execute arbitrary commands on the appliance.",
"fork": false,
"created_at": "2024-01-16T20:59:38Z",
2024-03-23 15:26:30 +09:00
"updated_at": "2024-03-23T04:34:06Z",
2024-01-17 15:40:17 +09:00
"pushed_at": "2024-01-17T00:38:28Z",
2024-03-23 15:26:30 +09:00
"stargazers_count": 42,
"watchers_count": 42,
2024-01-17 09:34:44 +09:00
"has_discussions": false,
2024-03-11 09:26:48 +09:00
"forks_count": 12,
2024-01-17 09:34:44 +09:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
2024-03-11 09:26:48 +09:00
"forks": 12,
2024-03-23 15:26:30 +09:00
"watchers": 42,
2024-01-17 09:34:44 +09:00
"score": 0,
2024-01-17 15:40:17 +09:00
"subscribers_count": 1
2024-01-17 21:46:30 +09:00
},
2024-01-19 03:29:23 +09:00
{
"id": 745015590,
"name": "CVE-2023-46805_CVE-2024-21887",
"full_name": "raminkarimkhani1996\/CVE-2023-46805_CVE-2024-21887",
"owner": {
"login": "raminkarimkhani1996",
"id": 26582031,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26582031?v=4",
"html_url": "https:\/\/github.com\/raminkarimkhani1996"
},
"html_url": "https:\/\/github.com\/raminkarimkhani1996\/CVE-2023-46805_CVE-2024-21887",
"description": "The script in this repository only checks whether the vulnerabilities specified in the Ivanti Connect Secure product exist.",
"fork": false,
"created_at": "2024-01-18T13:25:46Z",
2024-03-25 21:27:16 +09:00
"updated_at": "2024-03-25T12:26:55Z",
2024-03-24 03:26:58 +09:00
"pushed_at": "2024-03-23T14:52:22Z",
"stargazers_count": 3,
"watchers_count": 3,
2024-01-19 03:29:23 +09:00
"has_discussions": false,
2024-02-08 03:26:20 +09:00
"forks_count": 1,
2024-01-19 03:29:23 +09:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
2024-02-08 03:26:20 +09:00
"forks": 1,
2024-03-24 03:26:58 +09:00
"watchers": 3,
2024-01-19 03:29:23 +09:00
"score": 0,
2024-01-19 15:30:00 +09:00
"subscribers_count": 1
},
{
"id": 745284788,
"name": "Ivanti-Connect-Around-Scan",
"full_name": "seajaysec\/Ivanti-Connect-Around-Scan",
"owner": {
"login": "seajaysec",
"id": 7016191,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7016191?v=4",
"html_url": "https:\/\/github.com\/seajaysec"
},
"html_url": "https:\/\/github.com\/seajaysec\/Ivanti-Connect-Around-Scan",
2024-01-21 15:26:46 +09:00
"description": "Mitigation validation utility for the Ivanti Connect Around attack chain. Runs multiple checks. CVE-2023-46805, CVE-2024-21887.",
2024-01-19 15:30:00 +09:00
"fork": false,
"created_at": "2024-01-19T02:12:11Z",
2024-04-05 21:27:54 +09:00
"updated_at": "2024-04-05T07:44:30Z",
2024-02-03 15:25:41 +09:00
"pushed_at": "2024-02-03T01:59:49Z",
2024-04-05 21:27:54 +09:00
"stargazers_count": 12,
"watchers_count": 12,
2024-01-19 21:41:14 +09:00
"has_discussions": false,
2024-02-13 03:27:03 +09:00
"forks_count": 3,
2024-01-19 21:41:14 +09:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
2024-02-13 03:27:03 +09:00
"forks": 3,
2024-04-05 21:27:54 +09:00
"watchers": 12,
2024-01-19 21:41:14 +09:00
"score": 0,
2024-01-20 15:26:06 +09:00
"subscribers_count": 1
2024-01-19 21:41:14 +09:00
},
{
"id": 745384269,
"name": "CVE-2023-46805_CVE-2024-21887_scan_grouped",
"full_name": "mickdec\/CVE-2023-46805_CVE-2024-21887_scan_grouped",
"owner": {
"login": "mickdec",
"id": 33021266,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33021266?v=4",
"html_url": "https:\/\/github.com\/mickdec"
},
"html_url": "https:\/\/github.com\/mickdec\/CVE-2023-46805_CVE-2024-21887_scan_grouped",
"description": null,
"fork": false,
"created_at": "2024-01-19T08:11:31Z",
"updated_at": "2024-01-19T08:13:06Z",
"pushed_at": "2024-01-19T08:38:16Z",
2024-01-19 15:30:00 +09:00
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
2024-01-20 15:26:06 +09:00
"subscribers_count": 1
2024-01-21 09:26:08 +09:00
},
{
"id": 745995423,
"name": "CVE-2024-21887",
"full_name": "tucommenceapousser\/CVE-2024-21887",
"owner": {
"login": "tucommenceapousser",
"id": 129875733,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/129875733?v=4",
"html_url": "https:\/\/github.com\/tucommenceapousser"
},
"html_url": "https:\/\/github.com\/tucommenceapousser\/CVE-2024-21887",
"description": "exploit for ivanti",
"fork": false,
"created_at": "2024-01-20T19:15:23Z",
2024-01-21 21:36:38 +09:00
"updated_at": "2024-01-21T12:09:30Z",
2024-01-21 09:26:08 +09:00
"pushed_at": "2024-01-20T19:20:25Z",
2024-01-21 21:36:38 +09:00
"stargazers_count": 1,
"watchers_count": 1,
2024-01-21 09:26:08 +09:00
"has_discussions": false,
2024-01-21 21:36:38 +09:00
"forks_count": 1,
2024-01-21 09:26:08 +09:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
2024-01-21 21:36:38 +09:00
"forks": 1,
"watchers": 1,
2024-01-21 09:26:08 +09:00
"score": 0,
2024-01-21 15:26:46 +09:00
"subscribers_count": 1
2024-02-10 03:26:19 +09:00
},
{
"id": 755240791,
"name": "CVE-2024-21887",
"full_name": "imhunterand\/CVE-2024-21887",
"owner": {
"login": "imhunterand",
"id": 109766416,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/109766416?v=4",
"html_url": "https:\/\/github.com\/imhunterand"
},
"html_url": "https:\/\/github.com\/imhunterand\/CVE-2024-21887",
"description": "Ivanti Connect Secure & Ivanti Policy Secure allows an authenticated administrator to send specially crafted requests and execute arbitrary commands on the appliance. (RCE Exploits)",
"fork": false,
"created_at": "2024-02-09T18:07:06Z",
2024-03-25 09:26:43 +09:00
"updated_at": "2024-03-24T21:09:47Z",
2024-02-10 03:26:19 +09:00
"pushed_at": "2024-02-09T18:08:04Z",
2024-03-25 09:26:43 +09:00
"stargazers_count": 1,
"watchers_count": 1,
2024-02-10 03:26:19 +09:00
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2024-21887",
"exploit-code",
"rce-exploit",
"remote-code-execution"
],
"visibility": "public",
"forks": 0,
2024-03-25 09:26:43 +09:00
"watchers": 1,
2024-02-10 03:26:19 +09:00
"score": 0,
2024-02-10 15:25:50 +09:00
"subscribers_count": 1
2024-01-14 21:39:35 +09:00
}
]