CVE-2018-6961 Exploit in Python3
VMware NSX SD-WAN Edge by VeloCloud prior to version 3.1.0 contains a command injection vulnerability in the local web UI component. This component is disabled by default and should not be enabled on untrusted networks. VeloCloud by VMware will be removing this service from the product in future releases. Successful exploitation of this issue could result in remote code execution.
Links
- (CVE Details) https://nvd.nist.gov/vuln/detail/CVE-2018-6961
- (Original Python2 Exploit) https://www.exploit-db.com/exploits/44959/
Original Exploit Details
- Exploit Title: Unauthenticated Command Injection vulnerability in VMware NSX SD-WAN by VeloCloud
- Date: 2018-06-29
- Original Exploit Author: paragonsec @ Critical Start
- Python3 Exploit : R3dxpl0it
- Credit: Brian Sullivan from Tevora and Section 8 @ Critical Start
- Vendor Homepage: https://www.vmware.com
- Security Advisory: https://www.vmware.com/security/advisories/VMSA-2018-0011.html
- Version: 3.1.1
- CVE: CVE-2018-6961