Lucene search

K
nessusThis script is Copyright (C) 2023 and is owned by Tenable, Inc. or an Affiliate thereof.VMWARE_VREALIZE_LOG_INSIGHT_VMSA-2023-0007_CVE-2023-20864.NASL
HistoryApr 28, 2023 - 12:00 a.m.

VMware Aria Operations for Logs 8.10.2 RCE (VMSA-2023-0007)

2023-04-2800:00:00
This script is Copyright (C) 2023 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
17
vmware
aria operations
logs
remote code execution
vulnerability
insecure deserialization
nessus
update

10 High

AI Score

Confidence

High

0.191 Low

EPSS

Percentile

96.3%

The VMware Aria Operations for Logs (formerly VMware vRealize Log Insight) application running on the remote host is 8.10.2. It is, therefore, affected by a remote code execution vulnerability caused by insecure deserialization. An unauthenticated, malicious actor with network access to VMware Aria Operations for Logs can exploit this to execute arbitrary code as root.

Note that Nessus has not tested for these issues but has instead relied only on the application’s self-reported version number.

#%NASL_MIN_LEVEL 80900
##
# (C) Tenable, inc.
##

include('compat.inc');

if (description)
{
  script_id(174925);
  script_version("1.4");
  script_set_attribute(attribute:"plugin_modification_date", value:"2023/11/01");

  script_cve_id("CVE-2023-20864");
  script_xref(name:"CEA-ID", value:"CEA-2023-0012");
  script_xref(name:"IAVA", value:"2023-A-0220-S");

  script_name(english:"VMware Aria Operations for Logs 8.10.2 RCE (VMSA-2023-0007)");

  script_set_attribute(attribute:"synopsis", value:
"A log management application running on the remote host is affected by a remote code execution vulnerability.");
  script_set_attribute(attribute:"description", value:
"The VMware Aria Operations for Logs (formerly VMware vRealize Log Insight) application running on the remote host is
8.10.2. It is, therefore, affected by a remote code execution vulnerability caused by insecure deserialization. An
unauthenticated, malicious actor with network access to VMware Aria Operations for Logs can exploit this to execute
arbitrary code as root.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version
number.");
  script_set_attribute(attribute:"see_also", value:"https://www.vmware.com/security/advisories/VMSA-2023-0007.html");
  script_set_attribute(attribute:"solution", value:
"Upgrade to VMware Aria Operations for Logs version 8.12 or later.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:F/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2023-20864");

  script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"true");
  script_set_attribute(attribute:"exploit_framework_core", value:"true");

  script_set_attribute(attribute:"vuln_publication_date", value:"2023/04/20");
  script_set_attribute(attribute:"patch_publication_date", value:"2023/04/20");
  script_set_attribute(attribute:"plugin_publication_date", value:"2023/04/28");

  script_set_attribute(attribute:"plugin_type", value:"combined");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:vmware:vrealize_log_insight");
  script_set_attribute(attribute:"cpe", value:"x-cpe:/a:vmware:aria_operations_for_logs");
  script_set_attribute(attribute:"stig_severity", value:"I");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"CGI abuses");

  script_copyright(english:"This script is Copyright (C) 2023 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("vmware_vrealize_log_insight_webui_detect.nbin", "vmware_vrealize_log_insight_nix.nbin");
  script_require_keys("installed_sw/VMware vRealize Log Insight");

  exit(0);
}

include('vcf.inc');

var app_info = vcf::combined_get_app_info(app:'VMware vRealize Log Insight');

# https://kb.vmware.com/s/article/89907
# Remote detection only gets first 2 parts of version, 8.10, so use build to see if it's 8.10.2
if (app_info.version == '8.10' && app_info.Build == '21145187')
{
  app_info.display_version = '8.10.2';
}
else if (app_info.version == '8.10') # 8.10, not 8.10.2 - audit
{
  vcf::audit(app_info);
}

var constraints = [
  { 'equal' : '8.10', 'fixed_display' : '8.12' }, # Really 8.10.2 but remote
  { 'equal' : '8.10.2', 'fixed_display' : '8.12' }
];

vcf::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_HOLE);
VendorProductVersionCPE
vmwarevrealize_log_insightcpe:/a:vmware:vrealize_log_insight
vmwarearia_operations_for_logsx-cpe:/a:vmware:aria_operations_for_logs

10 High

AI Score

Confidence

High

0.191 Low

EPSS

Percentile

96.3%

Related for VMWARE_VREALIZE_LOG_INSIGHT_VMSA-2023-0007_CVE-2023-20864.NASL