关联漏洞
标题:VMware SD-WAN Edge 命令注入漏洞 (CVE-2018-6961)描述:VMware SD-WAN Edge是美国威睿(VMware)公司的一套网络和安全虚拟化平台。该平台为虚拟机提供部署在普通IP网络硬件上、可编程以及可移动的虚拟网络。 VMware NSX SD-WAN Edge by VeloCloud 3.1.0之前版本中的local Web UI组件存在命令注入漏洞。远程攻击者利用该漏洞在受影响应用程序的上下文中执行任意代码或造成拒绝服务。
描述
VMware NSX SD-WAN command injection vulnerability
介绍
# CVE-2018-6961 Exploit in Python3
VMware NSX SD-WAN Edge by VeloCloud prior to version 3.1.0 contains a command injection vulnerability in the local web UI component. This component is disabled by default and should not be enabled on untrusted networks. VeloCloud by VMware will be removing this service from the product in future releases. Successful exploitation of this issue could result in remote code execution.
# Links
* (CVE Details) https://nvd.nist.gov/vuln/detail/CVE-2018-6961
* (Original Python2 Exploit) https://www.exploit-db.com/exploits/44959/
# Original Exploit Details
* Exploit Title: Unauthenticated Command Injection vulnerability in VMware NSX SD-WAN by VeloCloud
* Date: 2018-06-29
* Original Exploit Author: paragonsec @ Critical Start
* _Python3 Exploit : R3dxpl0it_
* Credit: Brian Sullivan from Tevora and Section 8 @ Critical Start
* Vendor Homepage: https://www.vmware.com
* Security Advisory: https://www.vmware.com/security/advisories/VMSA-2018-0011.html
* Version: 3.1.1
* CVE: CVE-2018-6961
文件快照
[4.0K] /data/pocs/875e628315c097fb0cd1b7e9d13221456f950265
├── [3.0K] CVE-2018-6961.py
└── [1.0K] README.md
0 directories, 2 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。