CVE-2023-38344 (GCVE-0-2023-38344)
Vulnerability from cvelistv5 – Published: 2023-09-21 00:00 – Updated: 2024-09-24 16:55
VLAI?
Summary
An issue was discovered in Ivanti Endpoint Manager before 2022 SU4. A file disclosure vulnerability exists in the GetFileContents SOAP action exposed via /landesk/managementsuite/core/core.secure/OsdScript.asmx. The application does not sufficiently restrict user-supplied paths, allowing for an authenticated attacker to read arbitrary files from a remote system, including the private key used to authenticate to agents for remote access.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T17:39:12.204Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.ivanti.com/releases"
},
{
"tags": [
"x_transferred"
],
"url": "https://gist.github.com/bhyahoo/76533e91840200a1d9f3fb1eb87eb0f1"
}
],
"title": "CVE Program Container"
},
{
"affected": [
{
"cpes": [
"cpe:2.3:a:ivanti:endpoint_manager:2022:su4:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "endpoint_manager",
"vendor": "ivanti",
"versions": [
{
"lessThan": "2022_SU4",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-38344",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-09-24T16:50:37.739306Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-200",
"description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-09-24T16:55:31.523Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Ivanti Endpoint Manager before 2022 SU4. A file disclosure vulnerability exists in the GetFileContents SOAP action exposed via /landesk/managementsuite/core/core.secure/OsdScript.asmx. The application does not sufficiently restrict user-supplied paths, allowing for an authenticated attacker to read arbitrary files from a remote system, including the private key used to authenticate to agents for remote access."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-09-21T21:00:04.415196",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://www.ivanti.com/releases"
},
{
"url": "https://gist.github.com/bhyahoo/76533e91840200a1d9f3fb1eb87eb0f1"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2023-38344",
"datePublished": "2023-09-21T00:00:00",
"dateReserved": "2023-07-15T00:00:00",
"dateUpdated": "2024-09-24T16:55:31.523Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ivanti:endpoint_manager:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2022\", \"matchCriteriaId\": \"B1F6549B-CF5D-4607-B67D-5489905A1705\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ivanti:endpoint_manager:2022:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"46580865-5177-4E55-BDAC-73DA4B472B35\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ivanti:endpoint_manager:2022:su1:*:*:*:*:*:*\", \"matchCriteriaId\": \"E57E12B5-B789-450C-9476-6C4C151E6993\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ivanti:endpoint_manager:2022:su2:*:*:*:*:*:*\", \"matchCriteriaId\": \"E47C65B3-56DD-4D65-8B4B-6AFFE28E94F2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ivanti:endpoint_manager:2022:su3:*:*:*:*:*:*\", \"matchCriteriaId\": \"10D6EAB7-B14B-45E9-92B9-4FADFBBB08AF\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"An issue was discovered in Ivanti Endpoint Manager before 2022 SU4. A file disclosure vulnerability exists in the GetFileContents SOAP action exposed via /landesk/managementsuite/core/core.secure/OsdScript.asmx. The application does not sufficiently restrict user-supplied paths, allowing for an authenticated attacker to read arbitrary files from a remote system, including the private key used to authenticate to agents for remote access.\"}, {\"lang\": \"es\", \"value\": \"Se descubri\\u00f3 un problema en Ivanti Endpoint Manager antes de 2022 SU4. Existe una vulnerabilidad de divulgaci\\u00f3n de archivos en la acci\\u00f3n SOAP GetFileContents expuesta a trav\\u00e9s de /landesk/managementsuite/core/core.secure/OsdScript.asmx. La aplicaci\\u00f3n no restringe suficientemente las rutas proporcionadas por el usuario, lo que permite que un atacante autenticado lea archivos arbitrarios desde un sistema remoto, incluida la clave privada utilizada para autenticarse ante agentes para acceso remoto.\"}]",
"id": "CVE-2023-38344",
"lastModified": "2024-11-21T08:13:22.673",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\", \"baseScore\": 6.5, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 3.6}]}",
"published": "2023-09-21T21:15:10.877",
"references": "[{\"url\": \"https://gist.github.com/bhyahoo/76533e91840200a1d9f3fb1eb87eb0f1\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.ivanti.com/releases\", \"source\": \"cve@mitre.org\", \"tags\": [\"Release Notes\"]}, {\"url\": \"https://gist.github.com/bhyahoo/76533e91840200a1d9f3fb1eb87eb0f1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.ivanti.com/releases\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Release Notes\"]}]",
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-noinfo\"}]}, {\"source\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-200\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2023-38344\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2023-09-21T21:15:10.877\",\"lastModified\":\"2024-11-21T08:13:22.673\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An issue was discovered in Ivanti Endpoint Manager before 2022 SU4. A file disclosure vulnerability exists in the GetFileContents SOAP action exposed via /landesk/managementsuite/core/core.secure/OsdScript.asmx. The application does not sufficiently restrict user-supplied paths, allowing for an authenticated attacker to read arbitrary files from a remote system, including the private key used to authenticate to agents for remote access.\"},{\"lang\":\"es\",\"value\":\"Se descubri\u00f3 un problema en Ivanti Endpoint Manager antes de 2022 SU4. Existe una vulnerabilidad de divulgaci\u00f3n de archivos en la acci\u00f3n SOAP GetFileContents expuesta a trav\u00e9s de /landesk/managementsuite/core/core.secure/OsdScript.asmx. La aplicaci\u00f3n no restringe suficientemente las rutas proporcionadas por el usuario, lo que permite que un atacante autenticado lea archivos arbitrarios desde un sistema remoto, incluida la clave privada utilizada para autenticarse ante agentes para acceso remoto.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-200\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ivanti:endpoint_manager:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2022\",\"matchCriteriaId\":\"B1F6549B-CF5D-4607-B67D-5489905A1705\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ivanti:endpoint_manager:2022:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"46580865-5177-4E55-BDAC-73DA4B472B35\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ivanti:endpoint_manager:2022:su1:*:*:*:*:*:*\",\"matchCriteriaId\":\"E57E12B5-B789-450C-9476-6C4C151E6993\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ivanti:endpoint_manager:2022:su2:*:*:*:*:*:*\",\"matchCriteriaId\":\"E47C65B3-56DD-4D65-8B4B-6AFFE28E94F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ivanti:endpoint_manager:2022:su3:*:*:*:*:*:*\",\"matchCriteriaId\":\"10D6EAB7-B14B-45E9-92B9-4FADFBBB08AF\"}]}]}],\"references\":[{\"url\":\"https://gist.github.com/bhyahoo/76533e91840200a1d9f3fb1eb87eb0f1\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.ivanti.com/releases\",\"source\":\"cve@mitre.org\",\"tags\":[\"Release Notes\"]},{\"url\":\"https://gist.github.com/bhyahoo/76533e91840200a1d9f3fb1eb87eb0f1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.ivanti.com/releases\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://www.ivanti.com/releases\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://gist.github.com/bhyahoo/76533e91840200a1d9f3fb1eb87eb0f1\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T17:39:12.204Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-38344\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-09-24T16:50:37.739306Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:ivanti:endpoint_manager:2022:su4:*:*:*:*:*:*\"], \"vendor\": \"ivanti\", \"product\": \"endpoint_manager\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"2022_SU4\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-200\", \"description\": \"CWE-200 Exposure of Sensitive Information to an Unauthorized Actor\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-09-24T16:51:21.786Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"n/a\", \"product\": \"n/a\", \"versions\": [{\"status\": \"affected\", \"version\": \"n/a\"}]}], \"references\": [{\"url\": \"https://www.ivanti.com/releases\"}, {\"url\": \"https://gist.github.com/bhyahoo/76533e91840200a1d9f3fb1eb87eb0f1\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"An issue was discovered in Ivanti Endpoint Manager before 2022 SU4. A file disclosure vulnerability exists in the GetFileContents SOAP action exposed via /landesk/managementsuite/core/core.secure/OsdScript.asmx. The application does not sufficiently restrict user-supplied paths, allowing for an authenticated attacker to read arbitrary files from a remote system, including the private key used to authenticate to agents for remote access.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"text\", \"description\": \"n/a\"}]}], \"providerMetadata\": {\"orgId\": \"8254265b-2729-46b6-b9e3-3dfca2d5bfca\", \"shortName\": \"mitre\", \"dateUpdated\": \"2023-09-21T21:00:04.415196\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2023-38344\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-09-24T16:55:31.523Z\", \"dateReserved\": \"2023-07-15T00:00:00\", \"assignerOrgId\": \"8254265b-2729-46b6-b9e3-3dfca2d5bfca\", \"datePublished\": \"2023-09-21T00:00:00\", \"assignerShortName\": \"mitre\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…