cve/2023/CVE-2023-20887.md

35 lines
1.7 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-20887](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20887)
![](https://img.shields.io/static/v1?label=Product&message=Aria%20Operations%20for%20Networks%20(Formerly%20vRealize%20Network%20Insight)&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20Aria%20Operations%20for%20Networks%20(Formerly%20vRealize%20Network%20Insight)%206.x%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Networks%20Command%20Injection%20Vulnerability&color=brighgreen)
### Description
Aria Operations for Networks contains a command injection vulnerability. A malicious actor with network access to VMware Aria Operations for Networks may be able to perform a command injection attack resulting in remote code execution.
### POC
#### Reference
- http://packetstormsecurity.com/files/173761/VMWare-Aria-Operations-For-Networks-Remote-Command-Execution.html
#### Github
2024-06-10 18:01:06 +00:00
- https://github.com/0xMarcio/cve
2024-05-25 21:48:12 +02:00
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Awrrays/FrameVul
- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/CVEDB/top
- https://github.com/GhostTroops/TOP
- https://github.com/Malwareman007/CVE-2023-20887
- https://github.com/Ostorlab/KEV
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
- https://github.com/Threekiii/CVE
- https://github.com/abrahim7112/Vulnerability-checking-program-for-Android
- https://github.com/hktalent/TOP
- https://github.com/izj007/wechat
- https://github.com/miko550/CVE-2023-20887
- https://github.com/mynempel/e
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/sinsinology/CVE-2023-20887
2024-05-28 08:49:17 +00:00
- https://github.com/whoami13apt/files2
2024-05-25 21:48:12 +02:00