{"id":3931,"date":"2021-04-06T08:46:17","date_gmt":"2021-04-06T06:46:17","guid":{"rendered":"https:\/\/xopero.com\/blog\/?p=3931"},"modified":"2023-10-20T22:46:15","modified_gmt":"2023-10-20T20:46:15","slug":"bugs-in-vmware-vrealize-operations-platform-make-rce-and-admins-credentials-theft-possible","status":"publish","type":"post","link":"https:\/\/xopero.com\/blog\/en\/bugs-in-vmware-vrealize-operations-platform-make-rce-and-admins-credentials-theft-possible\/","title":{"rendered":"Bugs in VMware vRealize Operations platform make RCE and admin&#8217;s credentials theft possible"},"content":{"rendered":"\n<p>Welcome to the next episode of the&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/xopero.com\/blog\/en\/category\/security-center\/\" target=\"_blank\">Xopero Security Center<\/a>.&nbsp;Stealing admin credentials or gaining access to the platform capable of managing IT operations in various cloud deployments, allowing admins to monitor the health and capacity of virtual environments is a serious security breach. And these black scenarios become more than possible thanks to two newly discovered [and patched] vulnerabilities in VMware vRealize Operations platform. How severe is this new threat? To uncover this true check the whole post below.<\/p>\n\n\n\n<!--more-->\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-1\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"vmware-with-two-severe-vulnerabilities-in-vrealize-operations-platform-they-could-lead-to-rce-and-stealing-admins-credential\"><strong>VMware with two severe vulnerabilities in vRealize Operations platform \u2013 they could lead to RCE and stealing admin\u2019s credential<\/strong><\/h2>\n\n\n<p>VMware has published security updates to address high severity vulnerabilities which impact vRealize Operations, VMware Cloud Foundation, and vRealize Suite Lifecycle Manager. Unpatched, they could allow attackers to steal admin credentials after exploiting vulnerable servers.<\/p>\n\n\n\n<p>The first vulnerability &#8211; tracked as CVE-2021-21975 &#8211; was found in the vRealize Operations Manager API. This is a server-side request forgery (SSRF) bug with a CVSS score of 8.6 out of 10. It permits threat actors with network access to perform SSRF attacks and steal administrator credentials.<\/p>\n\n\n\n<p>The second bug, tracked as CVE-2021-21983 and scored 7.2 CVSS &#8211; was also discovered in the vRealize Operations Manager API. This bug does require an attacker to be authenticated and have network access to exploit (and first vulnerability could allow just that). But when these conditions are met the bug permits attackers to write files to arbitrary locations on the underlying photon operating system.<\/p>\n\n\n\n<p><strong>What is at stake?<\/strong><\/p>\n\n\n\n<p>&#8211; Pre-auth remote code execution and thief of admin credentials. Attackers can exploit the vulnerability remotely without requiring authentications or user interaction in low complexity attacks to steal administrative credentials. Patches are already available but VMware has also published workaround instructions for admins who don&#8217;t want to or can&#8217;t immediately patch vulnerable servers &#8211; there is a possibility that there is no patch for their version.<strong> <\/strong>Detailed information on how to do that is available on the vendor\u2019s <a href=\"https:\/\/kb.vmware.com\/s\/\" target=\"_blank\" rel=\"noreferrer noopener\">Knowledge Base<\/a>.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/vmware-fixes-bug-allowing-attackers-to-steal-admin-credentials\/\" target=\"_blank\" rel=\"noreferrer noopener\">Source<\/a><\/p>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-2\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"phps-git-server-hacked-to-add-backdoors-to-source-code-and-obtain-rce\"><strong>PHP&#8217;s Git server hacked to add backdoors to source code and obtain RCE<\/strong><\/h2>\n\n\n<p>The official PHP Git server has been compromised in a potential attempt to implant malware in the PHP project\u2019s code base. Two malicious commits were pushed to the php-src Git repository maintained by the PHP team on their git.php.net server.<\/p>\n\n\n\n<p>These commits were signed off as if they were made by known PHP developers and maintainers, Rasmus Lerdorf and Nikita Popov and masked as simple typographical errors that needed to be resolved.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><a href=\"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2023\/10\/Wlamanie-do-serwera-Git-PHP-w-celu-dodania-backdoorow-do-kodu-zrodlowego-PHP-1.png\"><img decoding=\"async\" width=\"1319\" height=\"761\" src=\"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2023\/10\/Wlamanie-do-serwera-Git-PHP-w-celu-dodania-backdoorow-do-kodu-zrodlowego-PHP-1.png\" alt=\"\" class=\"wp-image-5250\"\/><\/a><figcaption>Source: <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/phps-git-server-hacked-to-add-backdoors-to-php-source-code\/\" target=\"_blank\" rel=\"noreferrer noopener\">Bleeping Computer<\/a><\/figcaption><\/figure><\/div>\n\n\n\n<p>However, in the added line 370 where zend_eval_string function is called, the code actually plants a backdoor for obtaining easy Remote Code Execution (RCE) on a website running this hijacked version of PHP.<\/p>\n\n\n\n<p>Popov said the development team is not sure exactly how the attack took place. The clues indicate that the official git.php.net server was likely compromised, rather than individual Git accounts.<\/p>\n\n\n\n<p>Additionally, the malicious commit was made in the name of PHP creator, Rasmus Lerdorf. That is hardly surprising as with source code version control systems like Git, it is possible to sign-off a commit as coming from anybody else locally and then upload the spoofed commit to the remote Git server, where it gives off the impression as if it had indeed been signed-off by the person named on it.<\/p>\n\n\n\n<p>Luckily, the commits were detected and reverted before they made it downstream or impacted users. However, the incident is alarming considering PHP remains the server-side programming language to power over 79% of the websites on the Internet.<\/p>\n\n\n\n<p>An investigation into the security incident is now underway. The development team has also decided to move permanently to GitHub.<\/p>\n\n\n\n<p>Sources: <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/phps-git-server-hacked-to-add-backdoors-to-php-source-code\/\" target=\"_blank\" rel=\"noreferrer noopener\">1<\/a> |&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/official-php-git-server-targeted-in-attempt-to-bury-malware-in-code-base\/\" target=\"_blank\" rel=\"noreferrer noopener\">2<\/a><\/p>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-3\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"two-new-linux-vulnerabilities-could-let-attackers-extract-sensitive-information-from-kernel-memory\"><strong>Two new Linux vulnerabilities could let attackers extract sensitive information from kernel memory<\/strong><\/h2>\n\n\n<p>Two new vulnerabilities &#8211; tracked as CVE-2020-27170 and CVE-2020-27171 &#8211;&nbsp; impact all Linux kernels prior to 5.11.8. If successfully exploited, could let attackers circumvent mitigations for speculative attacks such as Spectre and obtain sensitive information from kernel memory.<\/p>\n\n\n\n<p>While CVE-2020-27170 can be abused to reveal content from any location within the kernel memory, CVE-2020-27171 can be used to retrieve data from a 4GB range of kernel memory.<\/p>\n\n\n\n<p>The new vulnerabilities uncovered by Piotr Krysiuk of Symantec&#8217;s Threat Hunter team aim to get around these Spectre\/Meltdown mitigations in Linux by taking advantage of the kernel&#8217;s support for extended Berkeley Packet Filters (eBPF) to extract the contents of the kernel memory. Specifically, the kernel (&#8222;kernel\/bpf\/verifier.c&#8221;) was found to perform undesirable out-of-bounds speculation on pointer arithmetic, thus defeating fixes for Spectre and opening the door for side-channel attacks.<\/p>\n\n\n\n<p>Unprivileged users could leverage these weaknesses to gain access to secrets from other users sharing the same vulnerable machine. If attackers gain access to an exploitable machine such as downloading malware onto the machine to achieve remote access this could also allow them to gain access to all user profiles on the machine.<\/p>\n\n\n\n<p>Official patches are available from March 20th. Ubuntu, Debian, and Red Hat deployed fixes in their respective Linux distributions as well.<\/p>\n\n\n\n<p><a href=\"https:\/\/thehackernews.com\/2021\/03\/new-bugs-could-let-hackers-bypass.html\" target=\"_blank\" rel=\"noreferrer noopener\">Source<\/a><\/p>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-4\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"docker-hub-images-downloaded-20m-times-spread-cryptominers\"><strong>Docker Hub images downloaded 20M times spread cryptominers<\/strong><\/h2>\n\n\n<p>At least 30 malicious publicly available images in Docker Hub, with a collective 20 million downloads, have been used to spread cryptomining malware. It is estimated that this trick brought authors around $200,000.&nbsp;<\/p>\n\n\n\n<p>Docker Hub is the largest library of container applications, allowing companies to share images internally or with their customers, or the developer community to distribute open-source projects.<\/p>\n\n\n\n<p>Aviv Sasson, the researcher with Palo Alto Networks\u2019 Unit 42&nbsp; found that they came from 10 different accounts. Some of them have names that clearly indicate their purpose, while others have misleading names like &#8222;proxy&#8221; or &#8222;ggcloud&#8221; or &#8222;docker.&#8221; Some of them are still available on Docker Hub at the moment of writing.&nbsp;<\/p>\n\n\n\n<p>In 90,3% of cases, the attackers&#8217; operation mined for Monero cryptocurrency, XMRig being the favorite tool for the purpose. However, some operations sought Grin (GRIN) or ARO (Aronium) cryptocurrency.<\/p>\n\n\n\n<p>Sasson found that the adversaries behind the malicious images have applied tags to them, which are a way to reference different versions of the same image. He theorized that the tags are used to match up the appropriate version of the malware depending on the various processor architectures or operating systems on which are downloaded. A common element for all the tags in an image is the wallet address or the mining pool credentials\u2026<\/p>\n\n\n\n<p>It\u2019s very possible that those images are merely the tip of the iceberg, given that the cloud presents big opportunities for cryptojacking attacks.<\/p>\n\n\n\n<p>Sources: <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/docker-hub-images-downloaded-20m-times-come-with-cryptominers\/\" target=\"_blank\" rel=\"noreferrer noopener\">1<\/a> | <a href=\"https:\/\/threatpost.com\/malicious-docker-cryptomining-images\/165120\/\" target=\"_blank\" rel=\"noreferrer noopener\">2<\/a><\/p>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-5\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"do-you-have-thirst-for-knowledge-there-are-ten-more-cybersecurity-stories-below\"><strong>Do you have thirst for knowledge? There are ten more cybersecurity stories below<\/strong><\/h2>\n\n\n<p>1. Hades Ransomware Linked to Hafnium and Exchange Attacks (<a href=\"https:\/\/www.infosecurity-magazine.com\/news\/hades-ransomware-linked-hafnium\/\" target=\"_blank\" rel=\"noreferrer noopener\">InfoSecurity<\/a>)<br>2. Ubiquiti cyberattack may be far worse than originally disclosed (<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/ubiquiti-cyberattack-may-be-far-worse-than-originally-disclosed\/\" target=\"_blank\" rel=\"noreferrer noopener\">Bleeping Computer<\/a>)<br>3. Exchange Server attacks: Run this Microsoft malware scanner now, CISA tells government agencies (<a href=\"https:\/\/www.zdnet.com\/article\/exchange-server-attacks-run-this-microsoft-malware-scanner-now-cisa-tells-government-agencies\/\" target=\"_blank\" rel=\"noreferrer noopener\">ZDNet<\/a>)<br>4. Hackers Using a Windows OS Feature to Evade Firewall and Gain Persistence (<a href=\"https:\/\/thehackernews.com\/2021\/04\/hackers-using-windows-os-feature-to.html\" target=\"_blank\" rel=\"noreferrer noopener\">The Hacker News<\/a>)<br>5. Malware hidden in game cheats and mods used to target gamers (<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/malware-hidden-in-game-cheats-and-mods-used-to-target-gamers\/\" target=\"_blank\" rel=\"noreferrer noopener\">Bleeping Computer<\/a>)<br>6. Fake jQuery files infect WordPress sites with malware (<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/fake-jquery-files-infect-wordpress-sites-with-malware\/\" target=\"_blank\" rel=\"noreferrer noopener\">Bleeping Computer<\/a>)<br>7. Ziggy Ransomware Gang Offers Refunds to Victims (<a href=\"https:\/\/threatpost.com\/ziggy-ransomware-gang-offers-refund-to-victims\/165124\/\" target=\"_blank\" rel=\"noreferrer noopener\">Threat Post<\/a>)<br>8. Hacker claims stealing 8.2TB of MobiKwik data; leaks some online (<a href=\"https:\/\/www.hackread.com\/hacker-steal-mobikwik-data-leaks-online\/\" target=\"_blank\" rel=\"noreferrer noopener\">Hack Read<\/a>)<br>9. GitHub Arctic Vault captures leaked patient medical data for 1,000 years (<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/github-arctic-vault-captures-leaked-patient-medical-data-for-1-000-years\/\" target=\"_blank\" rel=\"noreferrer noopener\">ZDNet<\/a>)<br>10. Android \u201cSystem Update\u201d malware steals photos, videos, GPS location (<a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/mobile\/2021\/04\/android-system-update-malware-steals-photos-videos-gps-location\/\" target=\"_blank\" rel=\"noreferrer noopener\">Malwarebytes LABS<\/a>)<\/p>\n\n\n","protected":false},"excerpt":{"rendered":"<p>Welcome to the next episode of the&nbsp;Xopero Security Center.&nbsp;Stealing admin credentials or gaining access to the platform capable of managing IT operations in various cloud deployments, allowing admins to monitor the health and capacity of virtual environments is a serious security breach. And these black scenarios become more than possible thanks to two newly discovered [and patched] vulnerabilities in VMware vRealize Operations platform. How severe is this new threat? To uncover this true check the whole post below.<\/p>\n","protected":false},"author":1,"featured_media":2447,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[470],"tags":[],"class_list":["post-3931","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersec-news","post--single"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Bugs in VMware vRealize Operations platform make RCE and admin&#039;s credentials theft possible - Xopero Blog<\/title>\n<meta name=\"description\" content=\"Two newly discovered [and patched] vulnerabilities in VMware vRealize Operations platform. How severe is this new threat? Uncover this true...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/xopero.com\/blog\/en\/bugs-in-vmware-vrealize-operations-platform-make-rce-and-admins-credentials-theft-possible\/\" \/>\n<meta property=\"og:locale\" content=\"pl_PL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Bugs in VMware vRealize Operations platform make RCE and admin&#039;s credentials theft possible - Xopero Blog\" \/>\n<meta property=\"og:description\" content=\"Two newly discovered [and patched] vulnerabilities in VMware vRealize Operations platform. How severe is this new threat? Uncover this true...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/xopero.com\/blog\/en\/bugs-in-vmware-vrealize-operations-platform-make-rce-and-admins-credentials-theft-possible\/\" \/>\n<meta property=\"og:site_name\" content=\"Xopero Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/XoperoSoftware\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-04-06T06:46:17+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-10-20T20:46:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1843\" \/>\n\t<meta property=\"og:image:height\" content=\"481\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"xopero_blogger\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@xoperobackup\" \/>\n<meta name=\"twitter:site\" content=\"@xoperobackup\" \/>\n<meta name=\"twitter:label1\" content=\"Napisane przez\" \/>\n\t<meta name=\"twitter:data1\" content=\"xopero_blogger\" \/>\n\t<meta name=\"twitter:label2\" content=\"Szacowany czas czytania\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minut\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/bugs-in-vmware-vrealize-operations-platform-make-rce-and-admins-credentials-theft-possible\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/bugs-in-vmware-vrealize-operations-platform-make-rce-and-admins-credentials-theft-possible\\\/\"},\"author\":{\"name\":\"xopero_blogger\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/person\\\/cab3d3cda6e8a1aecfa8abea8827b17c\"},\"headline\":\"Bugs in VMware vRealize Operations platform make RCE and admin&#8217;s credentials theft possible\",\"datePublished\":\"2021-04-06T06:46:17+00:00\",\"dateModified\":\"2023-10-20T20:46:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/bugs-in-vmware-vrealize-operations-platform-make-rce-and-admins-credentials-theft-possible\\\/\"},\"wordCount\":1236,\"publisher\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/bugs-in-vmware-vrealize-operations-platform-make-rce-and-admins-credentials-theft-possible\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/security-center-en.png\",\"articleSection\":[\"Cybersec news\"],\"inLanguage\":\"pl-PL\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/bugs-in-vmware-vrealize-operations-platform-make-rce-and-admins-credentials-theft-possible\\\/\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/bugs-in-vmware-vrealize-operations-platform-make-rce-and-admins-credentials-theft-possible\\\/\",\"name\":\"Bugs in VMware vRealize Operations platform make RCE and admin's credentials theft possible - Xopero Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/bugs-in-vmware-vrealize-operations-platform-make-rce-and-admins-credentials-theft-possible\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/bugs-in-vmware-vrealize-operations-platform-make-rce-and-admins-credentials-theft-possible\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/security-center-en.png\",\"datePublished\":\"2021-04-06T06:46:17+00:00\",\"dateModified\":\"2023-10-20T20:46:15+00:00\",\"description\":\"Two newly discovered [and patched] vulnerabilities in VMware vRealize Operations platform. How severe is this new threat? Uncover this true...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/bugs-in-vmware-vrealize-operations-platform-make-rce-and-admins-credentials-theft-possible\\\/#breadcrumb\"},\"inLanguage\":\"pl-PL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/bugs-in-vmware-vrealize-operations-platform-make-rce-and-admins-credentials-theft-possible\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/bugs-in-vmware-vrealize-operations-platform-make-rce-and-admins-credentials-theft-possible\\\/#primaryimage\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/security-center-en.png\",\"contentUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/security-center-en.png\",\"width\":1843,\"height\":481},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/bugs-in-vmware-vrealize-operations-platform-make-rce-and-admins-credentials-theft-possible\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Strona g\u0142\u00f3wna\",\"item\":\"https:\\\/\\\/xopero.com\\\/blog\\\/pl\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Bugs in VMware vRealize Operations platform make RCE and admin&#8217;s credentials theft possible\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/\",\"name\":\"Xopero Blog\",\"description\":\"Backup &amp; Recovery\",\"publisher\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/xopero.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pl-PL\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#organization\",\"name\":\"Xopero Software\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/xopero-niebieskie.png\",\"contentUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/xopero-niebieskie.png\",\"width\":500,\"height\":132,\"caption\":\"Xopero Software\"},\"image\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/XoperoSoftware\\\/\",\"https:\\\/\\\/x.com\\\/xoperobackup\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/opero-sp-z-o-o-\\\/?viewAsMember=true\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCRPWyeo1apjSgkDW3hZpB9g?reload=9\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/person\\\/cab3d3cda6e8a1aecfa8abea8827b17c\",\"name\":\"xopero_blogger\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g\",\"caption\":\"xopero_blogger\"},\"sameAs\":[\"https:\\\/\\\/xopero.com\"],\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/author\\\/xopero_blogger\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Bugs in VMware vRealize Operations platform make RCE and admin's credentials theft possible - Xopero Blog","description":"Two newly discovered [and patched] vulnerabilities in VMware vRealize Operations platform. How severe is this new threat? Uncover this true...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/xopero.com\/blog\/en\/bugs-in-vmware-vrealize-operations-platform-make-rce-and-admins-credentials-theft-possible\/","og_locale":"pl_PL","og_type":"article","og_title":"Bugs in VMware vRealize Operations platform make RCE and admin's credentials theft possible - Xopero Blog","og_description":"Two newly discovered [and patched] vulnerabilities in VMware vRealize Operations platform. How severe is this new threat? Uncover this true...","og_url":"https:\/\/xopero.com\/blog\/en\/bugs-in-vmware-vrealize-operations-platform-make-rce-and-admins-credentials-theft-possible\/","og_site_name":"Xopero Blog","article_publisher":"https:\/\/www.facebook.com\/XoperoSoftware\/","article_published_time":"2021-04-06T06:46:17+00:00","article_modified_time":"2023-10-20T20:46:15+00:00","og_image":[{"width":1843,"height":481,"url":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","type":"image\/png"}],"author":"xopero_blogger","twitter_card":"summary_large_image","twitter_creator":"@xoperobackup","twitter_site":"@xoperobackup","twitter_misc":{"Napisane przez":"xopero_blogger","Szacowany czas czytania":"6 minut"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/xopero.com\/blog\/en\/bugs-in-vmware-vrealize-operations-platform-make-rce-and-admins-credentials-theft-possible\/#article","isPartOf":{"@id":"https:\/\/xopero.com\/blog\/en\/bugs-in-vmware-vrealize-operations-platform-make-rce-and-admins-credentials-theft-possible\/"},"author":{"name":"xopero_blogger","@id":"https:\/\/xopero.com\/blog\/#\/schema\/person\/cab3d3cda6e8a1aecfa8abea8827b17c"},"headline":"Bugs in VMware vRealize Operations platform make RCE and admin&#8217;s credentials theft possible","datePublished":"2021-04-06T06:46:17+00:00","dateModified":"2023-10-20T20:46:15+00:00","mainEntityOfPage":{"@id":"https:\/\/xopero.com\/blog\/en\/bugs-in-vmware-vrealize-operations-platform-make-rce-and-admins-credentials-theft-possible\/"},"wordCount":1236,"publisher":{"@id":"https:\/\/xopero.com\/blog\/#organization"},"image":{"@id":"https:\/\/xopero.com\/blog\/en\/bugs-in-vmware-vrealize-operations-platform-make-rce-and-admins-credentials-theft-possible\/#primaryimage"},"thumbnailUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","articleSection":["Cybersec news"],"inLanguage":"pl-PL"},{"@type":"WebPage","@id":"https:\/\/xopero.com\/blog\/en\/bugs-in-vmware-vrealize-operations-platform-make-rce-and-admins-credentials-theft-possible\/","url":"https:\/\/xopero.com\/blog\/en\/bugs-in-vmware-vrealize-operations-platform-make-rce-and-admins-credentials-theft-possible\/","name":"Bugs in VMware vRealize Operations platform make RCE and admin's credentials theft possible - Xopero Blog","isPartOf":{"@id":"https:\/\/xopero.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/xopero.com\/blog\/en\/bugs-in-vmware-vrealize-operations-platform-make-rce-and-admins-credentials-theft-possible\/#primaryimage"},"image":{"@id":"https:\/\/xopero.com\/blog\/en\/bugs-in-vmware-vrealize-operations-platform-make-rce-and-admins-credentials-theft-possible\/#primaryimage"},"thumbnailUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","datePublished":"2021-04-06T06:46:17+00:00","dateModified":"2023-10-20T20:46:15+00:00","description":"Two newly discovered [and patched] vulnerabilities in VMware vRealize Operations platform. How severe is this new threat? Uncover this true...","breadcrumb":{"@id":"https:\/\/xopero.com\/blog\/en\/bugs-in-vmware-vrealize-operations-platform-make-rce-and-admins-credentials-theft-possible\/#breadcrumb"},"inLanguage":"pl-PL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/xopero.com\/blog\/en\/bugs-in-vmware-vrealize-operations-platform-make-rce-and-admins-credentials-theft-possible\/"]}]},{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/xopero.com\/blog\/en\/bugs-in-vmware-vrealize-operations-platform-make-rce-and-admins-credentials-theft-possible\/#primaryimage","url":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","contentUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","width":1843,"height":481},{"@type":"BreadcrumbList","@id":"https:\/\/xopero.com\/blog\/en\/bugs-in-vmware-vrealize-operations-platform-make-rce-and-admins-credentials-theft-possible\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Strona g\u0142\u00f3wna","item":"https:\/\/xopero.com\/blog\/pl\/"},{"@type":"ListItem","position":2,"name":"Bugs in VMware vRealize Operations platform make RCE and admin&#8217;s credentials theft possible"}]},{"@type":"WebSite","@id":"https:\/\/xopero.com\/blog\/#website","url":"https:\/\/xopero.com\/blog\/","name":"Xopero Blog","description":"Backup &amp; Recovery","publisher":{"@id":"https:\/\/xopero.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/xopero.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pl-PL"},{"@type":"Organization","@id":"https:\/\/xopero.com\/blog\/#organization","name":"Xopero Software","url":"https:\/\/xopero.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/xopero.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2019\/03\/xopero-niebieskie.png","contentUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2019\/03\/xopero-niebieskie.png","width":500,"height":132,"caption":"Xopero Software"},"image":{"@id":"https:\/\/xopero.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/XoperoSoftware\/","https:\/\/x.com\/xoperobackup","https:\/\/www.linkedin.com\/company\/opero-sp-z-o-o-\/?viewAsMember=true","https:\/\/www.youtube.com\/channel\/UCRPWyeo1apjSgkDW3hZpB9g?reload=9"]},{"@type":"Person","@id":"https:\/\/xopero.com\/blog\/#\/schema\/person\/cab3d3cda6e8a1aecfa8abea8827b17c","name":"xopero_blogger","image":{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/secure.gravatar.com\/avatar\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g","caption":"xopero_blogger"},"sameAs":["https:\/\/xopero.com"],"url":"https:\/\/xopero.com\/blog\/author\/xopero_blogger\/"}]}},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts\/3931","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/comments?post=3931"}],"version-history":[{"count":6,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts\/3931\/revisions"}],"predecessor-version":[{"id":5251,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts\/3931\/revisions\/5251"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/media\/2447"}],"wp:attachment":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/media?parent=3931"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/categories?post=3931"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/tags?post=3931"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}