Skip to content

Commit

Permalink
automatic module_metadata_base.json update
Browse files Browse the repository at this point in the history
  • Loading branch information
msjenkins-r7 committed Oct 24, 2023
1 parent ff9639e commit 70ae201
Showing 1 changed file with 77 additions and 0 deletions.
77 changes: 77 additions & 0 deletions db/modules_metadata_base.json
Original file line number Diff line number Diff line change
Expand Up @@ -84483,6 +84483,83 @@
"session_types": false,
"needs_cleanup": null
},
"exploit_linux/ssh/vmware_vrni_known_privkey": {
"name": "VMWare Aria Operations for Networks (vRealize Network Insight) SSH Private Key Exposure",
"fullname": "exploit/linux/ssh/vmware_vrni_known_privkey",
"aliases": [

],
"rank": 600,
"disclosure_date": "2023-08-29",
"type": "exploit",
"author": [
"h00die",
"SinSinology",
"Harsh Jaiswal ( <Harsh Jaiswal (@rootxharsh)>",
"Rahul Maini ( <Rahul Maini (@iamnoooob)>"
],
"description": "VMWare Aria Operations for Networks (vRealize Network Insight) versions 6.0.0 through 6.10.0\n do not randomize the SSH keys on virtual machine initialization. Since the key is easily\n retrievable, an attacker can use it to gain unauthorized remote access as the \"support\" (root) user.",
"references": [
"CVE-2023-34039",
"URL-https://github.com/sinsinology/CVE-2023-34039",
"URL-https://summoning.team/blog/vmware-vrealize-network-insight-rce-cve-2023-34039/",
"URL-https://www.vmware.com/security/advisories/VMSA-2023-0018.html"
],
"platform": "Unix",
"arch": "cmd",
"rport": 22,
"autofilter_ports": [

],
"autofilter_services": [

],
"targets": [
"6.0_platform",
"6.0_proxy",
"6.1_platform",
"6.1_proxy",
"6.2_collector",
"6.2_platform",
"6.3_collector",
"6.3_platform",
"6.4_collector",
"6.4_platform",
"6.5_collector",
"6.5_platform",
"6.6_collector",
"6.6_platform",
"6.7_collector",
"6.7_platform",
"6.8_collector",
"6.8_platform",
"6.9_collector",
"6.9_platform",
"6.10_collector",
"6.10_platform",
"All"
],
"mod_time": "2023-10-23 06:54:38 +0000",
"path": "/modules/exploits/linux/ssh/vmware_vrni_known_privkey.rb",
"is_install_path": true,
"ref_name": "linux/ssh/vmware_vrni_known_privkey",
"check": false,
"post_auth": false,
"default_credential": false,
"notes": {
"Stability": [
"crash-safe"
],
"Reliability": [
"repeatable-session"
],
"SideEffects": [
"ioc-in-logs"
]
},
"session_types": false,
"needs_cleanup": null
},
"exploit_linux/ssh/vyos_restricted_shell_privesc": {
"name": "VyOS restricted-shell Escape and Privilege Escalation",
"fullname": "exploit/linux/ssh/vyos_restricted_shell_privesc",
Expand Down

0 comments on commit 70ae201

Please sign in to comment.