PoC exploit for VMware Cloud Director RCE (CVE-2020-3956)
VMware Cloud Director 10.0.x prior to 10.0.0.2, 9.7.0.x prior to 126.96.36.199, 9.5.0.x prior to 188.8.131.52, and 9.1.0.x prior to 184.108.40.206 do not properly handle input leading to a code injection vulnerability. An authenticated actor may be able to send malicious traffic to VMware Cloud Director which may lead to arbitrary remote code execution. This vulnerability can be exploited through the HTML5- and Flex-based UIs, the API Explorer interface and API access.
Organizations offering trial accounts for versions of VMware Cloud Director lower than 10.1.0 risk exposing private clouds on their virtualized infrastructure to complete takeover attacks from a threat actor.
A code injection vulnerability exists in VMware Cloud Director (vCloud Director) 10.0.0.2, 220.127.116.11, 18.104.22.168, and 22.214.171.124 that may lead to remote code execution, VMware says in its security advisory.
Cloud Director software allows cloud-service providers around the world to deplo...