Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2022-31706

CWE-22Path Traversal6 documents6 sources
Severity
9.8CRITICAL
EPSS
89.4%
top 0.46%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedJan 26

Description

The vRealize Log Insight contains a Directory Traversal Vulnerability. An unauthenticated, malicious actor can inject files into the operating system of an impacted appliance which can result in remote code execution.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages2 packages

NVDvmware/vrealize_log_insight8.0.08.10.2+1
CVEListV5vrealize_log_insight_(vrli)vRealize Log Insight 8.10.1 and prior

Patches

🔴Vulnerability Details

3
GHSA
GHSA-653w-r2gq-wv35: The vRealize Log Insight contains a Directory Traversal Vulnerability2023-01-26
CVEList
CVE-2022-31706: The vRealize Log Insight contains a Directory Traversal Vulnerability2023-01-25
VulnCheck
VMware vrealize_log_insight Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')2022

💥Exploits & PoCs

1
Nuclei
VMware vRealize Log Insight - Path Traversal

📋Vendor Advisories

1
VMware
VMware vRealize Log Insight latest updates address multiple security vulnerabilities (CVE-2022-31706, CVE-2022-31704, CVE-2022-31710, CVE-2022-31711)2023-01-24
CVE-2022-31706 (CRITICAL CVSS 9.8) | The vRealize Log Insight contains a | cvebase.io