Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/horizon3ai/CVE-2021-38647
Proof on Concept Exploit for CVE-2021-38647 (OMIGOD)
https://github.com/horizon3ai/CVE-2021-38647
Last synced: 30 days ago
JSON representation
Proof on Concept Exploit for CVE-2021-38647 (OMIGOD)
- Host: GitHub
- URL: https://github.com/horizon3ai/CVE-2021-38647
- Owner: horizon3ai
- Created: 2021-09-16T02:11:36.000Z (about 3 years ago)
- Default Branch: main
- Last Pushed: 2021-09-16T10:39:04.000Z (about 3 years ago)
- Last Synced: 2024-08-03T15:05:07.506Z (4 months ago)
- Language: Python
- Size: 8.79 KB
- Stars: 236
- Watchers: 12
- Forks: 56
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
- awesome-hacking-lists - horizon3ai/CVE-2021-38647 - Proof on Concept Exploit for CVE-2021-38647 (OMIGOD) (Python)
README
# OMIGOD
Proof on Concept Exploit for CVE-2021-38647 (OMIGOD)For background information and context, read the our blog post detailing this vulnerability: https://www.horizon3.ai/news/blog/omigod
## Details
CVE-2021-38647 is an unauthenticated RCE vulnerability effecting the OMI agent as root.OMI agents are commonly found installed on Azure Linux servers when the following are in use:
* Azure Automation
* Azure Automatic Update
* Azure Operations Management Suite
* Azure Log Analytics
* Azure Configuration Management
* Azure Diagnostics## Usage
```bash
azureuser@linux:~$ python3 omigod.py -t 10.0.0.5 -c id
uid=0(root) gid=0(root) groups=0(root)
```## Example Output
![Proof](proof.png)## Mitigations
Update and ensure the OMI agent is at version 1.6.8.1.
* For Debian systems (e.g., Ubuntu): `dpkg -l omi`
* For Redhat based system (e.g., Fedora, CentOS, RHEL): `rpm -qa omi`## Prior Research Credit
For more details see the original researchers' work:
https://www.wiz.io/blog/omigod-critical-vulnerabilities-in-omi-azure## Disclaimer
This software has been created purely for the purposes of academic research and for the development of effective defensive techniques, and is not intended to be used to attack systems except where explicitly authorized. Project maintainers are not responsible or liable for misuse of the software. Use responsibly.