The VMware Aria Operations for Logs (formerly VMware vRealize Log Insight) application running on the remote host is affected by a command injection vulnerability. A malicious actor with administrative privileges in VMware Aria Operations for Logs can execute arbitrary commands as root.
Note that Nessus has not tested for these issues but has instead relied only on the application’s self-reported version number.
#%NASL_MIN_LEVEL 80900
##
# (C) Tenable, inc.
##
include('compat.inc');
if (description)
{
script_id(174924);
script_version("1.4");
script_set_attribute(attribute:"plugin_modification_date", value:"2023/11/01");
script_cve_id("CVE-2023-20865");
script_xref(name:"CEA-ID", value:"CEA-2023-0012");
script_xref(name:"IAVA", value:"2023-A-0220-S");
script_name(english:"VMware Aria Operations for Logs 8.6.x / 8.8.x / 8.10 / 8.10.2 Command Injection (VMSA-2023-0007)");
script_set_attribute(attribute:"synopsis", value:
"A log management application running on the remote host is affected a command injection vulnerability.");
script_set_attribute(attribute:"description", value:
"The VMware Aria Operations for Logs (formerly VMware vRealize Log Insight) application running on the remote host is
affected by a command injection vulnerability. A malicious actor with administrative privileges in VMware Aria
Operations for Logs can execute arbitrary commands as root.
Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version
number.");
script_set_attribute(attribute:"see_also", value:"https://www.vmware.com/security/advisories/VMSA-2023-0007.html");
script_set_attribute(attribute:"solution", value:
"Upgrade to VMware Aria Operations for Logs version 8.12 or later.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:M/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2023-20865");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"vuln_publication_date", value:"2023/04/20");
script_set_attribute(attribute:"patch_publication_date", value:"2023/04/20");
script_set_attribute(attribute:"plugin_publication_date", value:"2023/04/28");
script_set_attribute(attribute:"plugin_type", value:"combined");
script_set_attribute(attribute:"cpe", value:"cpe:/a:vmware:vrealize_log_insight");
script_set_attribute(attribute:"cpe", value:"x-cpe:/a:vmware:aria_operations_for_logs");
script_set_attribute(attribute:"stig_severity", value:"I");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"CGI abuses");
script_copyright(english:"This script is Copyright (C) 2023 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("vmware_vrealize_log_insight_webui_detect.nbin", "vmware_vrealize_log_insight_nix.nbin");
script_require_keys("installed_sw/VMware vRealize Log Insight");
exit(0);
}
include('vcf.inc');
var app_info = vcf::combined_get_app_info(app:'VMware vRealize Log Insight');
if (app_info.Build)
app_info.display_version = app_info.version + ' Build ' + app_info.Build;
var constraints = [
{ 'min_version' : '8.6', 'fixed_version' : '8.7', 'fixed_display' : '8.12' },
{ 'min_version' : '8.8', 'fixed_version' : '8.9', 'fixed_display' : '8.12' },
{ 'equal' : '8.10','fixed_display' : '8.12' },
{ 'equal' : '8.10.2', 'fixed_display' : '8.12' },
];
vcf::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_HOLE);
Vendor | Product | Version | CPE |
---|---|---|---|
vmware | aria_operations_for_logs | x-cpe:/a:vmware:aria_operations_for_logs | |
vmware | vrealize_log_insight | cpe:/a:vmware:vrealize_log_insight |