Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-20887 PoC — VMware Aria Operations 命令注入漏洞

Source
Associated Vulnerability
Title:VMware Aria Operations 命令注入漏洞 (CVE-2023-20887)
Description:VMware Aria Operations是美国威睿(VMware)公司的一个统一的、人工智能驱动的自动驾驶 IT 运营管理平台,适用于私有云、混合云和多云环境。 VMware Aria Operations Networks 6.x系列版本存在安全漏洞,攻击者利用该漏洞可以执行命令注入攻击,从而导致远程代码执行。
Description
VMWare vRealize Network Insight Pre-Authenticated RCE (CVE-2023-20887)
Readme
# CVE-2023-20887 Exploit
VMWare vRealize Network Insight Pre-Authenticated RCE (CVE-2023-20887)

# Usage
```shell
usage: exploit.py [-h] -t TARGET [-l LOCALHOST] [-p LOCALPORT]

optional arguments:
  -h, --help            show this help message and exit
  -t TARGET, --target TARGET
                        Target url, http://localhost:9000
  -l LOCALHOST, --localhost LOCALHOST
                        Local IP address for reverse shell
  -p LOCALPORT, --localport LOCALPORT
                        Local port for reverse shell
```

# Reference
https://github.com/sinsinology/CVE-2023-20887
File Snapshot

[4.0K] /data/pocs/7292e7f41d766678c60a4fbc0e7ba07104b06e6f ├── [2.4K] exploit.py ├── [ 592] README.md └── [ 9] requirements.txt 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.