Vulnerability Name:

CVE-2022-31706 (CCN-245360)

Assigned:2022-05-25
Published:2023-01-24
Updated:2023-02-01
Summary:VMware vRealize Log Insight could allow a remote attacker to traverse directories on the system. An attacker could send a specially-crafted URL request containing "dot dot" sequences (/../) to execute arbitrary code on the system.
CVSS v3 Severity:9.8 Critical (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
8.5 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
9.8 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
8.5 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:10.0 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Consequences:Obtain Information
References:Source: MITRE
Type: CNA
CVE-2022-31706

Source: XF
Type: UNKNOWN
vmware-cve202231706-dir-trav(245360)

Source: CCN
Type: VMware Security Advisory VMSA-2023-0001
VMware vRealize Log Insight latest updates address multiple security vulnerabilities (CVE-2022-31706, CVE-2022-31704, CVE-2022-31710, CVE-2022-31711)

Source: security@vmware.com
Type: Patch, Vendor Advisory
security@vmware.com

Vulnerable Configuration:Configuration CCN 1:
  • cpe:/a:vmware:vrealize_log_insight:8.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:cloud_foundation:3.0:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:cloud_foundation:4.0:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:vrealize_log_insight:8.1.0:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    vmware vrealize log insight 8.0.0
    vmware cloud foundation 3.0
    vmware cloud foundation 4.0
    vmware vrealize log insight 8.1.0