module

VMware View Planner Unauthenticated Log File Upload RCE

Disclosed
2021-03-02
Created
2021-03-18

Description

This module exploits an unauthenticated log file upload within the
log_upload_wsgi.py file of VMWare View Planner 4.6 prior to 4.6
Security Patch 1.

Successful exploitation will result in RCE as the apache user inside
the appacheServer Docker container.

Authors

Mikhail Klyuchnikov
wvu wvu@metasploit.com
Grant Willcox

Platform

Python

Module Options

To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:


msf > use exploit/linux/http/vmware_view_planner_4_6_uploadlog_rce
msf exploit(vmware_view_planner_4_6_uploadlog_rce) > show targets
...targets...
msf exploit(vmware_view_planner_4_6_uploadlog_rce) > set TARGET < target-id >
msf exploit(vmware_view_planner_4_6_uploadlog_rce) > show options
...show and set options...
msf exploit(vmware_view_planner_4_6_uploadlog_rce) > exploit

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.