Share
## https://sploitus.com/exploit?id=4B32FBEA-2A27-53F6-87F7-79C53E20095D
# CVE-2023-35078

This script ethically checks for the presence of cve-2023-35078 via requesting the `/ping` endpoint from the Ivanti EPMM API. 

`/ping` simply responds with the VSP version, rather than attemping to pull device or admin data.

Usage: `./CVE-2023-35078 <IP/Hostname>`

This script assumes https connections over default port.

## Setup

- Setup virtual env: `python3 -m venv env`
- Activate env: `source env/bin/activate`
- Install dependencies: `pip3 install -r requirements.txt`