关联漏洞
描述
Script - Workaround instructions to address CVE-2021-44228 in vCenter Server
介绍
# vCenter Server Workaround instructions CVE-2021-44228
Workaround instructions to address CVE-2021-44228 in vCenter Server
VMware vCenter log4j workaround
This is the workaround VMware vCenter log4j vulnerability CVE-2021-44228 processs put together as a single script
VMware have released a python script linked on the KB article (works Much better :-)
If you don't like quick and dirty..
Apply workarounds and verify
cve-workaround
Run verification only
cve-workaround -v
Rollback - very basic, copies the .bak files over the patched files, restarts the services, and prints status messages.
cve-workaround -rollback
PSC Client Service for 6.5 - thank you to Power-Wagon on reddit for verifying
cve-workaround -sprayandpray65
Simple steps:
SSH to vCenter
Type shell to enter shell mode
Paste entire contents of script
Type cve, hit tab, enter
And you're done.
The Process:
Automatically detects the version and required steps
Backs up existing files to .bak files
Applies the workarounds recommended by VMware
Skips any steps that are already applied
Reports status as it goes
Provides a summary at the end - verification is more accurate / granular than the KB steps
文件快照
[4.0K] /data/pocs/3c1b11fbf1ffb4c4520e22faf275fd0db9beeda0
├── [1.2K] README.md
└── [ 12K] run-cve-patch.sh
0 directories, 2 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。