cve/2023/CVE-2023-20900.md

19 lines
1.1 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-20900](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20900)
![](https://img.shields.io/static/v1?label=Product&message=VMware%20Tools%20(open-vm-tools)&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=VMware%20Tools&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%2012.x.x%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=SAML%20Token%20Signature%20Bypass%20vulnerability&color=brighgreen)
### Description
A malicious actor that has been granted Guest Operation Privileges https://docs.vmware.com/en/VMware-vSphere/8.0/vsphere-security/GUID-6A952214-0E5E-4CCF-9D2A-90948FF643EC.html  in a target virtual machine may be able to elevate their privileges if that target virtual machine has been assigned a more privileged Guest Alias https://vdc-download.vmware.com/vmwb-repository/dcr-public/d1902b0e-d479-46bf-8ac9-cee0e31e8ec0/07ce8dbd-db48-4261-9b8f-c6d3ad8ba472/vim.vm.guest.AliasManager.html .
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds