{"uuid": "dcbe3d97-a7c3-4c36-b479-b8e17d43110c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-31704", "type": "published-proof-of-concept", "source": "https://t.me/crackcodes/2486", "content": "\ud83d\udd25\ud83d\udd25\ud83d\udd25VMware vRealize Log Insight VMSA-2023-0001 Technical Deep Dive\nThis vulnerability is exploitable in the default configuration for VMware vRealize Log Insight. We have successfully reproduced this exploit and would like to provide the technical details about how this vulnerability works. \n\n\ud83d\udca5PoC for VMSA-2023-0001 affecting VMware vRealize Log Insight which includes the following CVEs:\n\ud83d\udcbe VMware vRealize Log Insight Directory Traversal Vulnerability\n(CVE-2022-31706)\n\ud83d\udcbe VMware vRealize Log Insight broken access control Vulnerability\n(CVE-2022-31704)\n\ud83d\udcbe VMware vRealize Log Insight contains an Information Disclosure Vulnerability\n(CVE-2022-31711)\n\nDownload:https://system32.ink/news-feed/p/205/", "creation_timestamp": "2023-02-02T01:33:27.000000Z"}