Rapid7 Vulnerability & Exploit Database

VMware vRealize Log Insight Unauthenticated RCE

Back to Search

VMware vRealize Log Insight Unauthenticated RCE

Disclosed
01/24/2023
Created
09/09/2023

Description

VMware vRealize Log Insights versions v8.x contains multiple vulnerabilities, such as directory traversal, broken access control, deserialization, and information disclosure. When chained together, these vulnerabilities allow a remote, unauthenticated attacker to execute arbitrary commands on the underlying operating system as the root user. This module achieves code execution via triggering a `RemotePakDownloadCommand` command via the exposed thrift service after obtaining the node token by calling a `GetConfigRequest` thrift command. After the download, it will trigger a `PakUpgradeCommand` for processing the specially crafted PAK archive, which then will place the JSP payload under a certain API endpoint (pre-authenticated) location upon extraction for gaining remote code execution. Successfully tested against version 8.0.2.

Author(s)

  • Horizon3.ai Attack Team
  • Ege BALCI <egebalci@pm.me>

Platform

Linux,Unix

Architectures

x86, x64

Development

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

msf > use exploit/linux/http/vmware_vrli_rce
msf exploit(vmware_vrli_rce) > show targets
    ...targets...
msf exploit(vmware_vrli_rce) > set TARGET < target-id >
msf exploit(vmware_vrli_rce) > show options
    ...show and set options...
msf exploit(vmware_vrli_rce) > exploit

Time is precious, so I don’t want to do something manually that I can automate. Leveraging the Metasploit Framework when automating any task keeps us from having to re-create the wheel as we can use the existing libraries and focus our efforts where it matters.

– Jim O’Gorman | President, Offensive Security

;