CVE-2018-6961 Scanner
CVE-2018-6961 Scanner - Command Injection vulnerability in VMware NSX SD-WAN Edge
Short Info
Level
Single Scan
Single Scan
Can be used by
Asset Owner
Estimated Time
10 seconds
Time Interval
24 days 4 hours
Scan only one
Domain, Subdomain, IPv4
Toolbox
VMware NSX SD-WAN Edge is a platform used by enterprises and service providers to deliver wide area network (WAN) connectivity as a service. It allows for improved performance and management of network resources. Organizations use this platform to ensure reliable and scalable network operations. Deployments can involve numerous branches and serve thousands of users, optimizing network traffic. NSX SD-WAN Edge enables seamless integration with cloud and on-premises services. It is designed to enhance network security and performance further.
The Command Injection vulnerability allows attackers to execute arbitrary commands on a vulnerable system. This is particularly dangerous because it can lead to unauthorized access and control of the affected device. It is often exploited by injecting harmful commands into web application interfaces. Unauthenticated attackers can manipulate application inputs to execute these commands. This results in unauthorized operations being performed on the host system. It is a critical vulnerability that organizations must address promptly to safeguard their infrastructures.
The vulnerability has been identified in the local web UI diagnostic tools (Ping/Traceroute) of VMware NSX SD-WAN Edge. By manipulating the 'destination' parameter, attackers can inject system commands. Specifically, using backticks or shell syntax allows command execution. The POST request to '/scripts/ajaxPortal.lua' endpoint is susceptible. If not properly sanitized, the parameter allows arbitrary command execution. Therefore, the integrity of network operations may be jeopardized.
Exploitation of this Command Injection vulnerability can have severe consequences, including unauthorized control over the system. Malicious users could execute arbitrary code with elevated privileges, potentially compromising sensitive data. The integrity and availability of network services may be affected. Unauthorized access to critical network resources can lead to further exploitation. Consequently, the overall security of the network infrastructure can be severely undermined. Organizations should address this risk by applying security patches and enhancing input validation mechanisms.
REFERENCES