VMware vCenter Server Appliance BlazeDS AMF3 RCE (VMSA-2017-0007)

This script is Copyright (C) 2017 Tenable Network Security, Inc.


Synopsis :

A virtualization appliance installed on the remote host is affected by
a remote code execution vulnerability.

Description :

The version of VMware vCenter Server Appliance installed on the remote
host is 6.0 prior to Update 3b or 6.5 prior to Update c. It is,
therefore, affected by a flaw in FlexBlazeDS when processing AMF3
messages due to allowing the instantiation of arbitrary classes when
deserializing objects. An unauthenticated, remote attacker can exploit
this, by sending a specially crafted Java object, to execute arbitrary
code.

See also :

https://www.vmware.com/security/advisories/VMSA-2017-0007.html
http://www.nessus.org/u?4e032520
http://www.nessus.org/u?4a1fa223
http://codewhitesec.blogspot.de/2017/04/amf.html

Solution :

Upgrade to VMware vCenter Server Appliance 6.0 Update 3b / 6.5 Update
c or later. Alternatively, apply the vendor-supplied workaround.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 6.9
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Family: Misc.

Nessus Plugin ID: 99474 ()

Bugtraq ID: 97383

CVE ID: CVE-2017-5641

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now