Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

[R1] VMWare vRealize Operations Manager Appliance Multiple Vulnerabilities Chained Remote Code Execution



The VMWare vRealize Operations Manager Appliance has an authenticated REST API called "Suite API" that is accessible through TCP port 443. Some of the API calls accept HTTP POSTs with payloads of “relay-request” in XML or JSON format. There are two vulnerabilities, that when used in conjunction, lead to an authenticated low-privilege user to achieve remote code execution.

#1 Suite API CollectorHttpRelayController RelayRequest Object DiskFileItem Deserialization (CVE-2016-7462)

This issue is due to arbitrary Object deserialization through the Suite API and the Apache Commons FileUpload library being on the classpath. Specifically, CollectorHttpRelayController deserializes base64'd objects stored in the "relay-request" XML. An attacker can exploit this by embedding a manipulated DiskFileItem in the XML. There are a few URLS that can be used to reach this controller (e.g. https://[target]/suite-api/internal/relay/heartbeat).

Attacks via this vector are limited to writing (with custom content) and moving files, but not overwriting. The library is designed so that uploaded files are created with partially static names ("upload_%u_%u.tmp" where one %u is a UUID and the other is a one-up counter) that cannot be controlled by the attacker. Even when moving files, the same type of random name implementation is used, which is a limiting factor. Alone, this vulnerability can be used to upload and move files with the privileges of the web server, allowing for an effective denial of service. For VMWare vRealize Operations, this attack allows for moving web server files, the database, files in /usr/lib/vmware-vcops, files in /storage/, and more. Just through basic experimentation, we found that moving files out of /storage/ caused the device to stop allowing remote terminal logins oddly enough.

#2 Commons Collections InvokerTransformer Class Java Unserialization Remote Code Execution (CVE-2015-6934)

This issue has been disclosed before for Apache Commons Collections, as well as many dozens of vendors who implement the library in such a way as to allow remote code execution. However, in regards to VMware, vRealize Operations is mentioned in the VMSA-2015-0009 advisory for the Commons Collections issue. However, there is a footnote under the affected product table that says "Exploitation of the issue on vRealize Operations, vCenter Operations, and vCenter Application Discovery Manager is limited to local privilege escalation." The vector we discovered allows for remote access, via a single combined POST request. Since exploitation is limited by a few factors, such as not seeing your command output, uploading or downloading a custom binary is not reliable, and tools such as wget or curl aren't likely to be found on a Windows target, exploitation in conjunction with the FileUpload issue puts you on a gravy train with biscuit wheels.

Due to CVE abstraction for the Apache Commons Collections issue being tracked on a per-vendor basis, this vector will fall under CVE-2015-6934.

Exploitation Note:

When POSTing to https://[target]/suite-api/internal/relay/heartbeat as an example, you will be prompted for a username/password via basic authentication. Additionally, you will need to include these two lines in the HTTP header:

  1. X-vRealizeOps-API-use-unsupported: yes\r\n
  2. Content-Type: application/xml\r\n

Apache -vs- Vendors, Attributing Blame:

We brought the FileUpload issue to Apache's attention a while back and they do not see it as a vulnerability. In their response to us, they stated:

"Having reviewed your report we have concluded that it does not represent a valid vulnerability in Apache Commons File Upload. If an application deserializes data from an untrusted source without filtering and/or validation that is an application vulnerability not a vulnerability in the library a potential attacker might leverage."

Tenable argued that if an application intends to deserialize DiskFileItems then they are still vulnerable to the altered object and they could have files written anywhere on their server, which seems to cross the privilege boundaries intended by the library based on the code.

Based on our research, there is no warning about distrusting this object included in their library, or mentioning the potential for problems. It seems like there could be a few lines of code to prevent the unintended aspect of this (files written to arbitrary locations), while still maintaining the functionality of the library. In doing that, it would add a layer of protection for companies that implement the library (which many do, and we are finding vulnerable).

After another Apache person mentioned that "java.io.File is serializable, too .. And, I assume that an intruder who manages to have a DiskFileItem created and getInputStream() invoked on it, can just as well create a File (or a String), and invoke new File(Input|Output)Stream?" We reminded them that the act of deserializing a DiskFileItem can cause arbitrary files to be written to disk. The attacker does not need to invoke a new outputstream because DiskFileItem's readObject() function has already done that for him. This is not expected behavior as best we can tell. This is also not at all like deserializing a Java.io.File. That said, we respect Apache's stance on this and are contacting vendors that implement the Commons FileUpload library in a way that makes their software vulnerable.


VMWare has released version 6.4.0 which addresses the new issue (#1 above). Please consult their advisory for more details.

Disclosure Timeline

2016-01-28 - FileUpload and Collections issues discovered to impact VMWare vRealize Operations
2016-02-04 - Submitted to ZDI for consideration, case bmartin005
2016-02-09 - ZDI declines, as they are "not acquiring post-auth reports"
2016-02-09 - Submitted to iDefense for consideration, case S-9adrxku9q6
2016-03-14 - Ping iDefense for update
2016-05-17 - Ping iDefense for update
2016-05-18 - iDefense says they owe us a response, will get back next week
2016-06-22 - Ping iDefense for update
2016-07-20 - Tenable officially withdraws the submission from iDefense. Program not active?
2016-07-20 - Inform vendor via [email protected]
2016-07-21 - VMware confirms receipt, starts investigation. Asks us three questions.
2016-07-22 - Tenable provides answers.
2016-08-18 - Ping vendor for update.
2016-08-20 - Vendor confirms RCE possible via #1 and #2. #1 already fixed in vCOps 6.2. #2 to be fixed in Q4.
2016-08-23 - Vendor sends clarification that #2 already fixed in vROps 6.2, #1 to be fixed in 6.4 in Q4, and 6.3 was released today.
2016-08-24 - Tenable sends two mails asking for various clarification on affected versions, fixed versions, and vROps vs vCOps confusion.
2016-08-24 - Vendor replies with very clear status of each.
2016-11-15 - Vendor says releasing vROps 6.4 tomorrow along with advisory, will be issue #1. Gives us CVE ID for issue.
2016-11-16 - Vendor publishes VMSA-2016-0020 and fix

All information within TRA advisories is provided “as is”, without warranty of any kind, including the implied warranties of merchantability and fitness for a particular purpose, and with no guarantee of completeness, accuracy, or timeliness. Individuals and organizations are responsible for assessing the impact of any actual or potential security vulnerability.

Tenable takes product security very seriously. If you believe you have found a vulnerability in one of our products, we ask that you please work with us to quickly resolve it in order to protect customers. Tenable believes in responding quickly to such reports, maintaining communication with researchers, and providing a solution in short order.

For more details on submitting vulnerability information, please see our Vulnerability Reporting Guidelines page.

If you have questions or corrections about this advisory, please email [email protected]

Try for Free Buy Now
Tenable.io FREE FOR 30 DAYS

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Sign up now.

Tenable.io BUY

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

65 assets

Choose Your Subscription Option:

Buy Now
Try for Free Buy Now

Try Nessus Professional Free


Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy Nessus Professional

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy a multi-year license and save. Add Advanced Support for access to phone, community and chat support 24 hours a day, 365 days a year. Full details here.

Try for Free Buy Now

Try Tenable.io Web Application Scanning


Enjoy full access to our latest web application scanning offering designed for modern applications as part of the Tenable.io platform. Safely scan your entire online portfolio for vulnerabilities with a high degree of accuracy without heavy manual effort or disruption to critical web applications. Sign up now.

Buy Tenable.io Web Application Scanning

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.



Buy Now

Try for Free Contact Sales

Try Tenable.io Container Security


Enjoy full access to the only container security offering integrated into a vulnerability management platform. Monitor container images for vulnerabilities, malware and policy violations. Integrate with continuous integration and continuous deployment (CI/CD) systems to support DevOps practices, strengthen security and support enterprise policy compliance.

Buy Tenable.io Container Security

Tenable.io Container Security seamlessly and securely enables DevOps processes by providing visibility into the security of container images – including vulnerabilities, malware and policy violations – through integration with the build process.

Try for Free Contact Sales

Try Tenable Lumin


Visualize and explore your Cyber Exposure, track risk reduction over time and benchmark against your peers with Tenable Lumin.

Buy Tenable Lumin

Contact a Sales Representative to see how Lumin can help you gain insight across your entire organization and manage cyber risk.