Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-22948 PoC — VMware vCenter Server 安全漏洞

Source
Associated Vulnerability
Title:VMware vCenter Server 安全漏洞 (CVE-2022-22948)
Description:Vmware VMware vCenter Server是美国威睿(Vmware)公司的一套服务器和虚拟化管理软件。该软件提供了一个用于管理VMware vSphere环境的集中式平台,可自动实施和交付虚拟基础架构。 VMware vCenter Server 存在安全漏洞,具有非管理访问权限的攻击者可能会利用该漏洞来获取对敏感信息的访问权限。
Description
Scanner for CVE-2022-22948 an Information Disclosure in VMWare vCenter
Readme

# CVE-2022-22948
## Information Disclosure in VMWare vCenter

-   Pentera’s research group discovered a vulnerability in VMWare’s vCenter Server program affecting VMWare’s software installed in 500,000 organizations worldwide responsible to manage their most critical systems
-   Our findings were proactively reported to VMWare and were released under CVE-2022-22948
-   Patch and additional info are available on [VMWare’s Advisory site](https://www.vmware.com/security/advisories/VMSA-2022-0009.html)

## Scanner

The scanner is designed to check whether the file in question has write access to the “cis” group, and is there any user in that group that has shell access to the host. 

For further explanation about CVE-2022-22948, please refer to our site [here](https://www.pentera.io/blog)

## Prerequisites
•	Credentials for a Linux (PhotonOS) vCenter host

•	Shell access 

## Usage

1. Download the scanner to your machine
2. Execute to following commands
```
chmod 777 ./CVE-2022-22948_scanner.sh
./CVE-2022-22948_scanner.sh
```

Results:
* Vulnerability found: "Host is vulnerable to CVE-2022-22948"
* Vulnerability not found: "Host isn't vulnerable to CVE-2022-22948"

## DISCLAIMER: 
The code described in this advisory (the “Code”) is provided on an “as is” and “as available” basis and may contain bugs, errors, and other defects. You are advised to safeguard important data and to use caution. By using this Code, you agree that Pentera shall have no liability to you for any claims in connection with the Code. Pentera disclaims any and all warranties and any and all liability for any direct, indirect, incidental, punitive, exemplary, special or consequential damages, even if Pentera or its related parties are advised of the possibility of such damages. Pentera undertakes no duty to update the Code or this advisory.

File Snapshot

[4.0K] /data/pocs/3c4860bbac694abdd71d28039d4ae8cbb1ffa978 ├── [ 228] CVE-2022-22948-scanner.sh └── [1.8K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.