VMware Workspace ONE Access and Identity Manager contain a remote code execution vulnerability due to server-side template injection. A malicious actor with network access can trigger a server-side template injection that may result in remote code execution.
CVE Infomation | Exploits or more Infomation |
---|---|
mitre | EXPLOIT DATABASE |
NVD | 0day.today |
vulmon.com | github |
CVE Details | |
JVN ENG JPN | |
Reconshell |
Software Tag: VMware(4 tweets) Windows(2 tweets)
List of frequently cited URLs
User | URL | Info Source | Date |
---|---|---|---|
CyberWarship | https://github.com/rapid7/metasploit-framework/pull/16512 | Source CyberWarship 1625807639459336192 | 2023/02/15 |
CyberWarship | https://twitter.com/CyberWarship/status/1625807639459336192... | Source CyberWarship 1625807639459336192 | 2023/02/15 |
beingsheerazali | https://github.com/rapid7/metasploit-framework/pull/16512 | Source beingsheerazali 1625818160908861442 | 2023/02/15 |
beingsheerazali | https://twitter.com/CyberWarship/status/1625807639459336192... | Source beingsheerazali 1625818160908861442 | 2023/02/15 |
__kokumoto | https://www.securityweek.com/most-weaponized-vulnerabilitie... | Source __kokumoto 1641088615957815296 | 2023/03/29 |
List of frequently cited URLs
User | URL | Info Source |
---|---|---|
CyberWarship | github.com | Show Tweet |
CyberWarship | twitter.com | Show Tweet |
beingsheerazali | github.com | Show Tweet |
beingsheerazali | twitter.com | Show Tweet |
__kokumoto | securityweek.com | Show Tweet |
Name | URL |
---|---|
sherlocksecurity/VMware-CVE-2022-22954 | https://github.com/sherlocksecurity/VMware-CVE-2022-22954 |
bewhale/CVE-2022-22954 | https://github.com/bewhale/CVE-2022-22954 |
jax7sec/CVE-2022-22954 | https://github.com/jax7sec/CVE-2022-22954 |
chaosec2021/CVE-2022-22954-VMware-RCE | https://github.com/chaosec2021/CVE-2022-22954-VMware-RCE |
tunelko/CVE-2022-22954-PoC | https://github.com/tunelko/CVE-2022-22954-PoC |
Anonymous-ghost/AttackWebFrameworkTools-5.0 | https://github.com/Anonymous-ghost/AttackWebFrameworkTools-5.0 |
lucksec/VMware-CVE-2022-22954 | https://github.com/lucksec/VMware-CVE-2022-22954 |
MSeymenD/CVE-2022-22954-Testi | https://github.com/MSeymenD/CVE-2022-22954-Testi |
aniqfakhrul/CVE-2022-22954 | https://github.com/aniqfakhrul/CVE-2022-22954 |
Vulnmachines/VMWare_CVE-2022-22954 | https://github.com/Vulnmachines/VMWare_CVE-2022-22954 |
Name | URL |
---|---|
sherlocksecurity/VMware-CVE-2022-22954 | github.com |
bewhale/CVE-2022-22954 | github.com |
jax7sec/CVE-2022-22954 | github.com |
chaosec2021/CVE-2022-22954-VMware-RCE | github.com |
tunelko/CVE-2022-22954-PoC | github.com |
Anonymous-ghost/AttackWebFrameworkTools-5.0 | github.com |
lucksec/VMware-CVE-2022-22954 | github.com |
MSeymenD/CVE-2022-22954-Testi | github.com |
aniqfakhrul/CVE-2022-22954 | github.com |
Vulnmachines/VMWare_CVE-2022-22954 | github.com |