module
Microsoft OMI Management Interface Authentication Bypass
Disclosed | Created |
---|---|
2021-09-14 | 2021-10-28 |
Disclosed
2021-09-14
Created
2021-10-28
Description
By removing the authentication header, an attacker can issue an HTTP request to the OMI management endpoint
that will cause it to execute an operating system command as the root user. This vulnerability was patched in
OMI version 1.6.8-1 (released September 8th 2021).
that will cause it to execute an operating system command as the root user. This vulnerability was patched in
OMI version 1.6.8-1 (released September 8th 2021).
Authors
Nir Ohfeld
Shir Tamari
Spencer McIntyre
wvu wvu@metasploit.com
Shir Tamari
Spencer McIntyre
wvu wvu@metasploit.com
Platform
Linux,Unix
Architectures
cmd, x86, x64
References
Module Options
To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.