VMware Released Patch for Multiple Vulnerabilities in VMware vRealize Log Insight (CVE-2022-31704, CVE-2022-31706, CVE-2022-31710, & CVE-2022-31711)

VMware has released a security advisory to address multiple vulnerabilities in its vRealize Log Insight product. The vulnerabilities have CVSSv3 scores ranging from 5.3 to 9.8. The vulnerabilities are being tracked as CVE-2022-31706, CVE-2022-31704, CVE-2022-31710, and CVE-2022-31711.
vRealize Log Insight is used by infrastructure and applications in any environment for intelligent log management. This is a highly scalable log management solution. This tool offers intuitive, actionable dashboards, sophisticated analytics, and broad third-party extensibility across physical, virtual, and cloud environments. This tool helps monitor and maintain extensive data and promotes rapid troubleshooting and root cause analysis.


VMware vRealize Log Insight Broken Access Control Vulnerability (CVE-2022-31704)

The broken access control vulnerability allows an unauthorized user to access restricted resources. Broken access control vulnerabilities are usually exploited by attackers to access files/endpoints that are available for privileged users only.  According to the VMware advisory, a malicious actor can exploit this vulnerability in VMware vRealize Log Insight to inject files into the affected appliance’s operating system, which could result in remote code execution.

VMware vRealize Log Insight Directory Traversal Vulnerability (CVE-2022-31706)

The directory traversal vulnerability, also known as path traversal vulnerability, allows an attacker to read arbitrary files on the server that is running a vulnerable application. According to the VMware advisory, an unauthenticated attacker can exploit the vulnerability to inject files into the operating system of an impacted appliance which can result in remote code execution. 

VMware vRealize Log Insight contains a Deserialization Vulnerability (CVE-2022-31710)

The deserialization vulnerability in the vRealize Log Insight requires no authentication for exploitation. According to the VMware advisory, an unauthenticated attacker can exploit the vulnerability to trigger the deserialization of untrusted data, which could result in a denial of service. 

VMware vRealize Log Insight contains an Information Disclosure Vulnerability (CVE-2022-31711)

Information disclosure vulnerability occurs when a website mistakenly makes sensitive information available to its users. The vulnerability existing in the vRealize Log Insight requires no authentication for exploitation. According to the VMware advisory, a malicious actor can exploit this vulnerability to remotely collect sensitive session and application information. 

Vulnerability Analysis

Three of four CVEs addressed in the advisory (CVE-2022-31704, CVE-2022-31706, and CVE-2022-31711) can be combined by an attacker to gain remote code execution as root 

Indicators of compromise (IOCs) 

The two indicators of compromise are mentioned below: 

  1. Log entries on the Log Insight server
  2. Network traffic to or from the Log Insight server 
Log entries IOCs

The Log Insight server stores logs in file /var/log/loginsight/runtime.log. The URL and the file name can be different, but they will always be in the format /tmp/fiilename>.pak. An administrator should assess the URL to see if it is a legitimate download URL to identify whether an attack has taken place. 

Network Traffic IOCs 

An attacker may perform the attack using two network protocols, Apache Thrift and HTTP(S) 

An attacker can exploit the Apache Thrift services running on ports 16520 through 16580 on the Log Insight instance. Any unidentified inbound traffic coming to these ports should be monitored to avoid exploitation of the vulnerability.  

The Log Insight instance must establish an outbound connection to a remote server to download a malicious payload for the attack to occur. All connections made by the Log Insight instance to unrecognized IP addresses should be further examined to identify whether an attack has occurred. 

Proof of Concept (PoC)

CVE-2022-31706 is the directory traversal vulnerability that could allow remote code execution on successful exploitation. The other two CVEs (CVE-2022-31704 and CVE-2022-317011) help exploit this vulnerability. 

The workaround KB90635 contains two scripts:  

  1. KB90635.sh
  2. KB90635_validate.sh 

These scripts insert and validate iptables rules restricting access to TCP ports 16520 through 16580.  

Vulnerable Ports Analysis

VMware vRealize Log Insight Firewall Recommendations document informs about the use of Apache Thrift RPC protocol in the TCP ports 16520 through 16580.  

 Apache Thrift is a software framework used for scalable cross-language services development. The software framework combines a software stack with a code generation engine to build services that work efficiently between C++, Java, Python, PHP, and other languages. 

The data types and service interfaces are defined in Apache Thrift using a straightforward definition file. The compiler uses that file as input and produces code that can be used to create RPC clients and servers quickly and easily, enabling cross-language communication.  

The TCP port 16520 is created by a java application, and the primary class is identified as com.vmware.loginsight.daemon.LogInsightDaemon. The file system shows that the primary class is stored in /usr/lib/loginsight/application/lib/daemon-service-li.jar. The function startThriftServer is responsible for starting the Apache Thrift server. The function startThriftServer analysis shows that the DaemonCommandsHandler class implements the server-side Thrift RPC commands. The file uses various RPC commands, which can be utilized to exploit the vulnerability.

Exploiting the Broken Access Control Vulnerability (CVE-2022-31704)

 To exploit this vulnerability, an attacker would have to implement a client for a simple function in DaemonCommandsHandler. The getNodeType can be used as it doesn’t require creating too many Thrift definitions and is easy to test. The command thrift –gen py loginsight.thrift will help create a simple Python client that will call getNodeType, confirming the exploitation of broken access control vulnerability. 

Exploiting the Directory Traversal Vulnerability (CVE-2022-31706)

The remotePakDownloadCommand in the requestCommand endpoint of RPC server can be used to reach out to an external URL to download a “Pak” file and place it in /tmp/<filename>.pak. The pakUpgradeCommand invokes the Python script loginsight-pak-upgrade.py to process downloaded files by remotePakDownloadCommand.  

Now, the script loginsight-pak-upgrade.py is the point of concern here. The script has a pak file that can be used to apply a system upgrade. The script informs that a Pak file is a tar file containing specific necessary files. Since this script extracts the tar file, an attacker might encode relative paths into the tar file and obtain an arbitrary file write or directory traversal. 


Here are the steps required for an attacker to gain remote code execution: 

  1. Create a Thrift client and using it for unauthenticated access to the Log Insight Thrift server.
  2. Create a malicious tar file containing a directory traversal using a valid Pak file.
  3. Using remotePakDownloadCommand to upload the malicious Pak file to /tmp/<filename>.pak.
  4. Extract the pak file using pakUpgradeCommand.

Affected versions

VMware vRealize Log Insight 8.x prior to 8.10.2 are affected by these vulnerabilities.


VMware has released VMware vRealize Log Insight version 8.10.2 to address these vulnerabilities. For more information about the mitigation, please refer to VMware Security Advisory (VMSA-2023-0001)


VMware updated the workaround on 30 January 2023. The article states, “Scripts updated to resolve the issue when executing in a FIPS-enabled environment.” The workaround contains two scripts: 

  1. KB90635.sh
  2. KB90635_validate.sh 

Perform the following steps for each vRealize Log Insight node in the cluster: 

  1. Log into the node as root via SSH (using Putty.exe or any similar SSH Client). 
  2. Upload the “KB90635.sh” script into the “/opt/vmware/bin/” folder using WinSCP or a similar utility. 
  3. Use the command mentioned below to change the file’s permissions and make it executable: 

chmod +x /opt/vmware/bin/KB90635.sh

Image source: KB90635  

  1. Execute the script, passing the “setup” argument:
    /opt/vmware/bin/KB90635.sh setup

Image source: KB90635 
Note: To confirm that the node is already a part of a VRLI cluster, the software prompts the user. Only standalone hosts or nodes that have already been added to a VRLI cluster should run this script. Ensure that the output of the command doesn’t contain any ERROR messages. 

  1. Proceed to the next node in the cluster and follow steps 1-4 on each appliance.
Validation of the workaround

The KB90635 states, “Please ensure that you have executed the steps above on ALL nodes on the cluster before proceeding with the workaround.” 

  1. Log into the node as root via SSH (using Putty.exe or any similar SSH Client) 
  2. Upload the “KB90635_validate.sh” script into the “/opt/vmware/bin/” folder using WinSCP or a similar utility. 
  3. Change the file’s permissions and make it executable by running the command below: 

chmod +x /opt/vmware/bin/KB90635_validate.sh

Image source: KB90635 

  1. Execute the validation steps by running the command:
  2.   Ensure that all the VRLI nodes in the cluster are listed in the output.  

Image source: KB90635 

  1. The script will continue to execute the required steps. Please follow the output and ensure that no errors are reported. Upon successful completion, a message like the one below will be displayed. 

Image source: KB90635 
For more information, please refer to KB90635.

Qualys Detection

Qualys customers can scan their devices with QIDs 377932 and 730717 to detect vulnerable assets. 
Please continue to follow Qualys Threat Protection for more coverage of the latest vulnerabilities.  

Leave a Reply

Your email address will not be published. Required fields are marked *