From 70ae201d5fae286864b2179c46582e72ec42170f Mon Sep 17 00:00:00 2001 From: Metasploit Date: Tue, 24 Oct 2023 10:55:19 -0500 Subject: [PATCH] automatic module_metadata_base.json update --- db/modules_metadata_base.json | 77 +++++++++++++++++++++++++++++++++++ 1 file changed, 77 insertions(+) diff --git a/db/modules_metadata_base.json b/db/modules_metadata_base.json index 19c7e42b0b1f..05bc799701ff 100644 --- a/db/modules_metadata_base.json +++ b/db/modules_metadata_base.json @@ -84483,6 +84483,83 @@ "session_types": false, "needs_cleanup": null }, + "exploit_linux/ssh/vmware_vrni_known_privkey": { + "name": "VMWare Aria Operations for Networks (vRealize Network Insight) SSH Private Key Exposure", + "fullname": "exploit/linux/ssh/vmware_vrni_known_privkey", + "aliases": [ + + ], + "rank": 600, + "disclosure_date": "2023-08-29", + "type": "exploit", + "author": [ + "h00die", + "SinSinology", + "Harsh Jaiswal ( ", + "Rahul Maini ( " + ], + "description": "VMWare Aria Operations for Networks (vRealize Network Insight) versions 6.0.0 through 6.10.0\n do not randomize the SSH keys on virtual machine initialization. Since the key is easily\n retrievable, an attacker can use it to gain unauthorized remote access as the \"support\" (root) user.", + "references": [ + "CVE-2023-34039", + "URL-https://github.com/sinsinology/CVE-2023-34039", + "URL-https://summoning.team/blog/vmware-vrealize-network-insight-rce-cve-2023-34039/", + "URL-https://www.vmware.com/security/advisories/VMSA-2023-0018.html" + ], + "platform": "Unix", + "arch": "cmd", + "rport": 22, + "autofilter_ports": [ + + ], + "autofilter_services": [ + + ], + "targets": [ + "6.0_platform", + "6.0_proxy", + "6.1_platform", + "6.1_proxy", + "6.2_collector", + "6.2_platform", + "6.3_collector", + "6.3_platform", + "6.4_collector", + "6.4_platform", + "6.5_collector", + "6.5_platform", + "6.6_collector", + "6.6_platform", + "6.7_collector", + "6.7_platform", + "6.8_collector", + "6.8_platform", + "6.9_collector", + "6.9_platform", + "6.10_collector", + "6.10_platform", + "All" + ], + "mod_time": "2023-10-23 06:54:38 +0000", + "path": "/modules/exploits/linux/ssh/vmware_vrni_known_privkey.rb", + "is_install_path": true, + "ref_name": "linux/ssh/vmware_vrni_known_privkey", + "check": false, + "post_auth": false, + "default_credential": false, + "notes": { + "Stability": [ + "crash-safe" + ], + "Reliability": [ + "repeatable-session" + ], + "SideEffects": [ + "ioc-in-logs" + ] + }, + "session_types": false, + "needs_cleanup": null + }, "exploit_linux/ssh/vyos_restricted_shell_privesc": { "name": "VyOS restricted-shell Escape and Privilege Escalation", "fullname": "exploit/linux/ssh/vyos_restricted_shell_privesc",