<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Vulnerabilidades archivos - RAGASYS SISTEMAS</title>
	<atom:link href="https://blog.ragasys.es/tag/vulnerabilidades/feed" rel="self" type="application/rss+xml" />
	<link>https://blog.ragasys.es/tag/vulnerabilidades</link>
	<description>Soporte técnico para las TIC</description>
	<lastBuildDate>Mon, 20 Dec 2021 07:31:53 +0000</lastBuildDate>
	<language>es</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2020/05/logoRGS_18_05_2020.png?fit=32%2C32&#038;ssl=1</url>
	<title>Vulnerabilidades archivos - RAGASYS SISTEMAS</title>
	<link>https://blog.ragasys.es/tag/vulnerabilidades</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">111701399</site>	<item>
		<title>vCENTER SERVER APPLIANCE &#8211; CVE-2021-44228 y CVE-2021-45046 &#8211; Remote code execution vulnerability via Apache Log4j</title>
		<link>https://blog.ragasys.es/vcenter-server-appliance-cve-2021-44228-remote-code-execution-vulnerability-via-apache-log4j</link>
					<comments>https://blog.ragasys.es/vcenter-server-appliance-cve-2021-44228-remote-code-execution-vulnerability-via-apache-log4j#comments</comments>
		
		<dc:creator><![CDATA[Jose Ramon Ramos Gata]]></dc:creator>
		<pubDate>Thu, 16 Dec 2021 08:36:30 +0000</pubDate>
				<category><![CDATA[vCenter]]></category>
		<category><![CDATA[VCSA]]></category>
		<category><![CDATA[VMware]]></category>
		<category><![CDATA[Vulnerabilidades]]></category>
		<guid isPermaLink="false">https://blog.ragasys.es/?p=14503</guid>

					<description><![CDATA[<p>Hola a tod@s. En este post vamos a ver como corregir una vulnerabilidad crítica en Apache Log4j identificada por CVE-2021-44228 y CVE-2021-45046 que puede permitir la ejecución remota de código en VMware, esto ya está documentado en una KB de&#8230; <a href="https://blog.ragasys.es/vcenter-server-appliance-cve-2021-44228-remote-code-execution-vulnerability-via-apache-log4j" class="more-link">Continuar leyendo <span class="meta-nav">&#8594;</span></a></p>
<p>La entrada <a href="https://blog.ragasys.es/vcenter-server-appliance-cve-2021-44228-remote-code-execution-vulnerability-via-apache-log4j">vCENTER SERVER APPLIANCE &#8211; CVE-2021-44228 y CVE-2021-45046 &#8211; Remote code execution vulnerability via Apache Log4j</a> se publicó primero en <a href="https://blog.ragasys.es">RAGASYS SISTEMAS</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Hola a tod@s.</p>
<p>En este post vamos a ver como corregir una vulnerabilidad crítica en Apache Log4j identificada por CVE-2021-44228 y CVE-2021-45046 que puede permitir la ejecución remota de código en VMware, esto ya está documentado en una <a href="https://kb.vmware.com/s/article/87081" target="_blank" rel="noopener">KB de VMware</a>, pero bueno, aquí os lo dejo de manera más gráfica, por si os viene bien.</p>
<p><strong>CVE-2021-44228 y CVE-2021-45046 &#8211; Remote code execution vulnerability via Apache Log4j</strong></p>
<p><strong>PASO 1:</strong></p>
<ul>
<li>Nos descargamos el script <a href="https://kb.vmware.com/sfc/servlet.shepherd/version/download/0685G00000cQFzjQAG" target="_blank" rel="noopener">vmsa-2021-0028-kb87081.py</a>:</li>
</ul>
<p><a href="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_1.png?ssl=1" data-lbwps-width="1318" data-lbwps-height="308" data-lbwps-srcsmall="https://blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_1.png"><img data-recalc-dims="1" loading="lazy" decoding="async" data-attachment-id="14504" data-permalink="https://blog.ragasys.es/vcenter-server-appliance-cve-2021-44228-remote-code-execution-vulnerability-via-apache-log4j/vcsac24rcevval4j_1#main" data-orig-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_1.png?fit=1318%2C308&amp;ssl=1" data-orig-size="1318,308" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="vcsac24rcevval4j_1" data-image-description="" data-image-caption="" data-large-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_1.png?fit=640%2C149&amp;ssl=1" class="aligncenter size-full wp-image-14504" src="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_1.png?resize=640%2C150&#038;ssl=1" alt="" width="640" height="150" srcset="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_1.png?w=1318&amp;ssl=1 1318w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_1.png?resize=595%2C139&amp;ssl=1 595w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_1.png?resize=960%2C224&amp;ssl=1 960w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_1.png?resize=768%2C179&amp;ssl=1 768w" sizes="auto, (max-width: 640px) 100vw, 640px" /></a></p>
<ul>
<li>Ahora accedemos a la Shell de nuestro vCenter Server Appliance:</li>
</ul>
<p><a href="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_2.png?ssl=1" data-lbwps-width="875" data-lbwps-height="353" data-lbwps-srcsmall="https://blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_2.png"><img data-recalc-dims="1" loading="lazy" decoding="async" data-attachment-id="14505" data-permalink="https://blog.ragasys.es/vcenter-server-appliance-cve-2021-44228-remote-code-execution-vulnerability-via-apache-log4j/vcsac24rcevval4j_2#main" data-orig-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_2.png?fit=875%2C353&amp;ssl=1" data-orig-size="875,353" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="vcsac24rcevval4j_2" data-image-description="" data-image-caption="" data-large-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_2.png?fit=640%2C258&amp;ssl=1" class="aligncenter size-full wp-image-14505" src="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_2.png?resize=640%2C258&#038;ssl=1" alt="" width="640" height="258" srcset="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_2.png?w=875&amp;ssl=1 875w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_2.png?resize=595%2C240&amp;ssl=1 595w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_2.png?resize=768%2C310&amp;ssl=1 768w" sizes="auto, (max-width: 640px) 100vw, 640px" /></a></p>
<ul>
<li>Accedemos al dircetorio <strong>/tmp</strong> y con el editor <strong>vi</strong> nos creamos el fichero <strong>vmsa-2021-0028-kb87081.py</strong>:</li>
</ul>
<p><a href="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_3.png?ssl=1" data-lbwps-width="836" data-lbwps-height="384" data-lbwps-srcsmall="https://blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_3.png"><img data-recalc-dims="1" loading="lazy" decoding="async" data-attachment-id="14506" data-permalink="https://blog.ragasys.es/vcenter-server-appliance-cve-2021-44228-remote-code-execution-vulnerability-via-apache-log4j/vcsac24rcevval4j_3#main" data-orig-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_3.png?fit=836%2C384&amp;ssl=1" data-orig-size="836,384" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="vcsac24rcevval4j_3" data-image-description="" data-image-caption="" data-large-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_3.png?fit=640%2C294&amp;ssl=1" class="aligncenter size-full wp-image-14506" src="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_3.png?resize=640%2C294&#038;ssl=1" alt="" width="640" height="294" srcset="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_3.png?w=836&amp;ssl=1 836w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_3.png?resize=595%2C273&amp;ssl=1 595w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_3.png?resize=768%2C353&amp;ssl=1 768w" sizes="auto, (max-width: 640px) 100vw, 640px" /></a></p>
<ul>
<li>Una vez dentro del editor vi tecleamos <strong>i</strong> para insertar texto y copiamos el contenido del script que nos hemos descargado:</li>
</ul>
<p><a href="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_4.png?ssl=1" data-lbwps-width="1414" data-lbwps-height="1007" data-lbwps-srcsmall="https://blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_4.png"><img data-recalc-dims="1" loading="lazy" decoding="async" data-attachment-id="14507" data-permalink="https://blog.ragasys.es/vcenter-server-appliance-cve-2021-44228-remote-code-execution-vulnerability-via-apache-log4j/vcsac24rcevval4j_4#main" data-orig-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_4.png?fit=1414%2C1007&amp;ssl=1" data-orig-size="1414,1007" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="vcsac24rcevval4j_4" data-image-description="" data-image-caption="" data-large-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_4.png?fit=640%2C456&amp;ssl=1" class="aligncenter size-full wp-image-14507" src="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_4.png?resize=640%2C456&#038;ssl=1" alt="" width="640" height="456" srcset="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_4.png?w=1414&amp;ssl=1 1414w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_4.png?resize=595%2C424&amp;ssl=1 595w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_4.png?resize=960%2C684&amp;ssl=1 960w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_4.png?resize=768%2C547&amp;ssl=1 768w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_4.png?w=1280&amp;ssl=1 1280w" sizes="auto, (max-width: 640px) 100vw, 640px" /></a></p>
<p><a href="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_5.png?ssl=1" data-lbwps-width="1104" data-lbwps-height="909" data-lbwps-srcsmall="https://blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_5.png"><img data-recalc-dims="1" loading="lazy" decoding="async" data-attachment-id="14508" data-permalink="https://blog.ragasys.es/vcenter-server-appliance-cve-2021-44228-remote-code-execution-vulnerability-via-apache-log4j/vcsac24rcevval4j_5#main" data-orig-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_5.png?fit=1104%2C909&amp;ssl=1" data-orig-size="1104,909" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="vcsac24rcevval4j_5" data-image-description="" data-image-caption="" data-large-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_5.png?fit=640%2C527&amp;ssl=1" class="aligncenter size-full wp-image-14508" src="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_5.png?resize=640%2C527&#038;ssl=1" alt="" width="640" height="527" srcset="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_5.png?w=1104&amp;ssl=1 1104w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_5.png?resize=595%2C490&amp;ssl=1 595w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_5.png?resize=960%2C790&amp;ssl=1 960w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_5.png?resize=768%2C632&amp;ssl=1 768w" sizes="auto, (max-width: 640px) 100vw, 640px" /></a></p>
<ul>
<li>Presionamos <strong>ESC</strong> y<strong> :wq!</strong> y <strong>Enter</strong> para guardar el script:</li>
</ul>
<p><a href="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_6.png?ssl=1" data-lbwps-width="704" data-lbwps-height="353" data-lbwps-srcsmall="https://blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_6.png"><img data-recalc-dims="1" loading="lazy" decoding="async" data-attachment-id="14509" data-permalink="https://blog.ragasys.es/vcenter-server-appliance-cve-2021-44228-remote-code-execution-vulnerability-via-apache-log4j/vcsac24rcevval4j_6#main" data-orig-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_6.png?fit=704%2C353&amp;ssl=1" data-orig-size="704,353" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="vcsac24rcevval4j_6" data-image-description="" data-image-caption="" data-large-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_6.png?fit=640%2C321&amp;ssl=1" class="aligncenter size-full wp-image-14509" src="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_6.png?resize=640%2C321&#038;ssl=1" alt="" width="640" height="321" srcset="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_6.png?w=704&amp;ssl=1 704w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_6.png?resize=595%2C298&amp;ssl=1 595w" sizes="auto, (max-width: 640px) 100vw, 640px" /></a></p>
<ul>
<li>Ejecutamos el script utilizando el comando <strong>Python /tmp/vmsa-2021-0028-kb87081.py</strong>:</li>
</ul>
<p><a href="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_7.png?ssl=1" data-lbwps-width="1489" data-lbwps-height="231" data-lbwps-srcsmall="https://blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_7.png"><img data-recalc-dims="1" loading="lazy" decoding="async" data-attachment-id="14510" data-permalink="https://blog.ragasys.es/vcenter-server-appliance-cve-2021-44228-remote-code-execution-vulnerability-via-apache-log4j/vcsac24rcevval4j_7#main" data-orig-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_7.png?fit=1489%2C231&amp;ssl=1" data-orig-size="1489,231" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="vcsac24rcevval4j_7" data-image-description="" data-image-caption="" data-large-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_7.png?fit=640%2C99&amp;ssl=1" class="aligncenter size-full wp-image-14510" src="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_7.png?resize=640%2C99&#038;ssl=1" alt="" width="640" height="99" srcset="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_7.png?w=1489&amp;ssl=1 1489w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_7.png?resize=595%2C92&amp;ssl=1 595w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_7.png?resize=960%2C149&amp;ssl=1 960w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_7.png?resize=768%2C119&amp;ssl=1 768w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_7.png?w=1280&amp;ssl=1 1280w" sizes="auto, (max-width: 640px) 100vw, 640px" /></a></p>
<p><a href="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_8.png?ssl=1" data-lbwps-width="1376" data-lbwps-height="383" data-lbwps-srcsmall="https://blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_8.png"><img data-recalc-dims="1" loading="lazy" decoding="async" data-attachment-id="14511" data-permalink="https://blog.ragasys.es/vcenter-server-appliance-cve-2021-44228-remote-code-execution-vulnerability-via-apache-log4j/vcsac24rcevval4j_8#main" data-orig-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_8.png?fit=1376%2C383&amp;ssl=1" data-orig-size="1376,383" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="vcsac24rcevval4j_8" data-image-description="" data-image-caption="" data-large-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_8.png?fit=640%2C178&amp;ssl=1" class="aligncenter size-full wp-image-14511" src="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_8.png?resize=640%2C178&#038;ssl=1" alt="" width="640" height="178" srcset="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_8.png?w=1376&amp;ssl=1 1376w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_8.png?resize=595%2C166&amp;ssl=1 595w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_8.png?resize=960%2C267&amp;ssl=1 960w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_8.png?resize=768%2C214&amp;ssl=1 768w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_8.png?w=1280&amp;ssl=1 1280w" sizes="auto, (max-width: 640px) 100vw, 640px" /></a></p>
<ul>
<li>Y como podemos ver todo perfecto, ya tenemos el parche aplicado a la vulnerabilidad de log4j:</li>
</ul>
<p><a href="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_9.png?ssl=1" data-lbwps-width="1135" data-lbwps-height="913" data-lbwps-srcsmall="https://blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_9.png"><img data-recalc-dims="1" loading="lazy" decoding="async" data-attachment-id="14512" data-permalink="https://blog.ragasys.es/vcenter-server-appliance-cve-2021-44228-remote-code-execution-vulnerability-via-apache-log4j/vcsac24rcevval4j_9#main" data-orig-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_9.png?fit=1135%2C913&amp;ssl=1" data-orig-size="1135,913" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="vcsac24rcevval4j_9" data-image-description="" data-image-caption="" data-large-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_9.png?fit=640%2C515&amp;ssl=1" class="aligncenter size-full wp-image-14512" src="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_9.png?resize=640%2C515&#038;ssl=1" alt="" width="640" height="515" srcset="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_9.png?w=1135&amp;ssl=1 1135w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_9.png?resize=595%2C479&amp;ssl=1 595w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_9.png?resize=960%2C772&amp;ssl=1 960w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_9.png?resize=768%2C618&amp;ssl=1 768w" sizes="auto, (max-width: 640px) 100vw, 640px" /></a></p>
<p><strong>PASO 2:</strong></p>
<ul>
<li>Nos descargamos el script <strong><a href="https://kb.vmware.com/sfc/servlet.shepherd/version/download/0685G00000d7LlTQAU" target="_blank" rel="noopener">remove_log4j_class.py</a>:</strong></li>
</ul>
<p><a href="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_10.png?ssl=1" data-lbwps-width="1338" data-lbwps-height="307" data-lbwps-srcsmall="https://blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_10.png"><img data-recalc-dims="1" loading="lazy" decoding="async" data-attachment-id="14520" data-permalink="https://blog.ragasys.es/vcenter-server-appliance-cve-2021-44228-remote-code-execution-vulnerability-via-apache-log4j/vcsac24rcevval4j_10#main" data-orig-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_10.png?fit=1338%2C307&amp;ssl=1" data-orig-size="1338,307" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="vcsac24rcevval4j_10" data-image-description="" data-image-caption="" data-large-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_10.png?fit=640%2C147&amp;ssl=1" class="aligncenter size-full wp-image-14520" src="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_10.png?resize=640%2C147&#038;ssl=1" alt="" width="640" height="147" srcset="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_10.png?w=1338&amp;ssl=1 1338w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_10.png?resize=595%2C137&amp;ssl=1 595w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_10.png?resize=960%2C220&amp;ssl=1 960w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_10.png?resize=768%2C176&amp;ssl=1 768w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_10.png?w=1280&amp;ssl=1 1280w" sizes="auto, (max-width: 640px) 100vw, 640px" /></a></p>
<ul>
<li>Accedemos a la Shell de nuestro vCenter Server Appliance:</li>
</ul>
<p><a href="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_11.png?ssl=1" data-lbwps-width="785" data-lbwps-height="298" data-lbwps-srcsmall="https://blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_11.png"><img data-recalc-dims="1" loading="lazy" decoding="async" data-attachment-id="14521" data-permalink="https://blog.ragasys.es/vcenter-server-appliance-cve-2021-44228-remote-code-execution-vulnerability-via-apache-log4j/vcsac24rcevval4j_11#main" data-orig-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_11.png?fit=785%2C298&amp;ssl=1" data-orig-size="785,298" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="vcsac24rcevval4j_11" data-image-description="" data-image-caption="" data-large-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_11.png?fit=640%2C243&amp;ssl=1" class="aligncenter size-full wp-image-14521" src="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_11.png?resize=640%2C243&#038;ssl=1" alt="" width="640" height="243" srcset="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_11.png?w=785&amp;ssl=1 785w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_11.png?resize=595%2C226&amp;ssl=1 595w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_11.png?resize=768%2C292&amp;ssl=1 768w" sizes="auto, (max-width: 640px) 100vw, 640px" /></a></p>
<ul>
<li>Para habilitar el bash shell antes de empezar a usar <strong>WinSCP</strong> ejecutamos este comando <strong>shell.set &#8211;enable True</strong>:</li>
</ul>
<p><a href="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_12.png?ssl=1" data-lbwps-width="784" data-lbwps-height="313" data-lbwps-srcsmall="https://blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_12.png"><img data-recalc-dims="1" loading="lazy" decoding="async" data-attachment-id="14522" data-permalink="https://blog.ragasys.es/vcenter-server-appliance-cve-2021-44228-remote-code-execution-vulnerability-via-apache-log4j/vcsac24rcevval4j_12#main" data-orig-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_12.png?fit=784%2C313&amp;ssl=1" data-orig-size="784,313" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="vcsac24rcevval4j_12" data-image-description="" data-image-caption="" data-large-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_12.png?fit=640%2C256&amp;ssl=1" class="aligncenter size-full wp-image-14522" src="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_12.png?resize=640%2C256&#038;ssl=1" alt="" width="640" height="256" srcset="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_12.png?w=784&amp;ssl=1 784w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_12.png?resize=595%2C238&amp;ssl=1 595w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_12.png?resize=768%2C307&amp;ssl=1 768w" sizes="auto, (max-width: 640px) 100vw, 640px" /></a></p>
<ul>
<li>Ejecutamos este comando para acceder al bash shell <strong>shell:</strong></li>
</ul>
<p><a href="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_13.png?ssl=1" data-lbwps-width="834" data-lbwps-height="375" data-lbwps-srcsmall="https://blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_13.png"><img data-recalc-dims="1" loading="lazy" decoding="async" data-attachment-id="14523" data-permalink="https://blog.ragasys.es/vcenter-server-appliance-cve-2021-44228-remote-code-execution-vulnerability-via-apache-log4j/vcsac24rcevval4j_13#main" data-orig-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_13.png?fit=834%2C375&amp;ssl=1" data-orig-size="834,375" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="vcsac24rcevval4j_13" data-image-description="" data-image-caption="" data-large-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_13.png?fit=640%2C288&amp;ssl=1" class="aligncenter size-full wp-image-14523" src="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_13.png?resize=640%2C288&#038;ssl=1" alt="" width="640" height="288" srcset="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_13.png?w=834&amp;ssl=1 834w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_13.png?resize=595%2C268&amp;ssl=1 595w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_13.png?resize=768%2C345&amp;ssl=1 768w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_13.png?resize=300%2C135&amp;ssl=1 300w" sizes="auto, (max-width: 640px) 100vw, 640px" /></a></p>
<ul>
<li>En el bash shell, ejecutamos este comando para cambiar el shell por defecto a bash <strong>chsh -s /bin/bash root:</strong></li>
</ul>
<p><a href="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_14.png?ssl=1" data-lbwps-width="802" data-lbwps-height="343" data-lbwps-srcsmall="https://blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_14.png"><img data-recalc-dims="1" loading="lazy" decoding="async" data-attachment-id="14524" data-permalink="https://blog.ragasys.es/vcenter-server-appliance-cve-2021-44228-remote-code-execution-vulnerability-via-apache-log4j/vcsac24rcevval4j_14#main" data-orig-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_14.png?fit=802%2C343&amp;ssl=1" data-orig-size="802,343" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="vcsac24rcevval4j_14" data-image-description="" data-image-caption="" data-large-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_14.png?fit=640%2C274&amp;ssl=1" class="aligncenter size-full wp-image-14524" src="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_14.png?resize=640%2C274&#038;ssl=1" alt="" width="640" height="274" srcset="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_14.png?w=802&amp;ssl=1 802w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_14.png?resize=595%2C254&amp;ssl=1 595w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_14.png?resize=768%2C328&amp;ssl=1 768w" sizes="auto, (max-width: 640px) 100vw, 640px" /></a></p>
<ul>
<li>Ahora accedemos con WinSCP a nuestro vCenter Server Apppliance y cómo podemos ver se accede directamente al bash:</li>
</ul>
<p><a href="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_15.png?ssl=1" data-lbwps-width="1583" data-lbwps-height="768" data-lbwps-srcsmall="https://blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_15-1536x745.png"><img data-recalc-dims="1" loading="lazy" decoding="async" data-attachment-id="14525" data-permalink="https://blog.ragasys.es/vcenter-server-appliance-cve-2021-44228-remote-code-execution-vulnerability-via-apache-log4j/vcsac24rcevval4j_15#main" data-orig-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_15.png?fit=1583%2C768&amp;ssl=1" data-orig-size="1583,768" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="vcsac24rcevval4j_15" data-image-description="" data-image-caption="" data-large-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_15.png?fit=640%2C311&amp;ssl=1" class="aligncenter size-full wp-image-14525" src="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_15.png?resize=640%2C310&#038;ssl=1" alt="" width="640" height="310" srcset="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_15.png?w=1583&amp;ssl=1 1583w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_15.png?resize=595%2C289&amp;ssl=1 595w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_15.png?resize=960%2C466&amp;ssl=1 960w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_15.png?resize=768%2C373&amp;ssl=1 768w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_15.png?resize=1536%2C745&amp;ssl=1 1536w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_15.png?w=1280&amp;ssl=1 1280w" sizes="auto, (max-width: 640px) 100vw, 640px" /></a></p>
<ul>
<li>Subimos el script <strong>remove_log4j_class.py </strong>al directorio <strong>/tmp</strong> del vCenter Server Appliance:</li>
</ul>
<p><a href="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_16.png?ssl=1" data-lbwps-width="1566" data-lbwps-height="711" data-lbwps-srcsmall="https://blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_16-1536x697.png"><img data-recalc-dims="1" loading="lazy" decoding="async" data-attachment-id="14526" data-permalink="https://blog.ragasys.es/vcenter-server-appliance-cve-2021-44228-remote-code-execution-vulnerability-via-apache-log4j/vcsac24rcevval4j_16#main" data-orig-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_16.png?fit=1566%2C711&amp;ssl=1" data-orig-size="1566,711" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="vcsac24rcevval4j_16" data-image-description="" data-image-caption="" data-large-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_16.png?fit=640%2C291&amp;ssl=1" class="aligncenter size-full wp-image-14526" src="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_16.png?resize=640%2C291&#038;ssl=1" alt="" width="640" height="291" srcset="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_16.png?w=1566&amp;ssl=1 1566w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_16.png?resize=595%2C270&amp;ssl=1 595w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_16.png?resize=960%2C436&amp;ssl=1 960w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_16.png?resize=768%2C349&amp;ssl=1 768w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_16.png?resize=1536%2C697&amp;ssl=1 1536w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_16.png?resize=300%2C135&amp;ssl=1 300w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_16.png?w=1280&amp;ssl=1 1280w" sizes="auto, (max-width: 640px) 100vw, 640px" /></a></p>
<p><a href="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_17.png?ssl=1" data-lbwps-width="1551" data-lbwps-height="711" data-lbwps-srcsmall="https://blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_17-1536x704.png"><img data-recalc-dims="1" loading="lazy" decoding="async" data-attachment-id="14527" data-permalink="https://blog.ragasys.es/vcenter-server-appliance-cve-2021-44228-remote-code-execution-vulnerability-via-apache-log4j/vcsac24rcevval4j_17#main" data-orig-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_17.png?fit=1551%2C711&amp;ssl=1" data-orig-size="1551,711" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="vcsac24rcevval4j_17" data-image-description="" data-image-caption="" data-large-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_17.png?fit=640%2C293&amp;ssl=1" class="aligncenter size-full wp-image-14527" src="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_17.png?resize=640%2C293&#038;ssl=1" alt="" width="640" height="293" srcset="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_17.png?w=1551&amp;ssl=1 1551w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_17.png?resize=595%2C273&amp;ssl=1 595w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_17.png?resize=960%2C440&amp;ssl=1 960w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_17.png?resize=768%2C352&amp;ssl=1 768w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_17.png?resize=1536%2C704&amp;ssl=1 1536w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_17.png?w=1280&amp;ssl=1 1280w" sizes="auto, (max-width: 640px) 100vw, 640px" /></a></p>
<ul>
<li>Ejecutamos el script <strong>python remove_log4j_class.py</strong><strong>:</strong></li>
</ul>
<p><a href="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_18.png?ssl=1" data-lbwps-width="1583" data-lbwps-height="505" data-lbwps-srcsmall="https://blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_18-1536x490.png"><img data-recalc-dims="1" loading="lazy" decoding="async" data-attachment-id="14528" data-permalink="https://blog.ragasys.es/vcenter-server-appliance-cve-2021-44228-remote-code-execution-vulnerability-via-apache-log4j/vcsac24rcevval4j_18#main" data-orig-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_18.png?fit=1583%2C505&amp;ssl=1" data-orig-size="1583,505" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="vcsac24rcevval4j_18" data-image-description="" data-image-caption="" data-large-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_18.png?fit=640%2C204&amp;ssl=1" class="aligncenter size-full wp-image-14528" src="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_18.png?resize=640%2C204&#038;ssl=1" alt="" width="640" height="204" srcset="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_18.png?w=1583&amp;ssl=1 1583w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_18.png?resize=595%2C190&amp;ssl=1 595w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_18.png?resize=960%2C306&amp;ssl=1 960w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_18.png?resize=768%2C245&amp;ssl=1 768w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_18.png?resize=1536%2C490&amp;ssl=1 1536w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_18.png?w=1280&amp;ssl=1 1280w" sizes="auto, (max-width: 640px) 100vw, 640px" /></a></p>
<ul>
<li>Como podemos ver, todo el proceso se ha realizado correctamente:</li>
</ul>
<p><a href="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_19.png?ssl=1" data-lbwps-width="1727" data-lbwps-height="787" data-lbwps-srcsmall="https://blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_19-1536x700.png"><img data-recalc-dims="1" loading="lazy" decoding="async" data-attachment-id="14529" data-permalink="https://blog.ragasys.es/vcenter-server-appliance-cve-2021-44228-remote-code-execution-vulnerability-via-apache-log4j/vcsac24rcevval4j_19#main" data-orig-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_19.png?fit=1727%2C787&amp;ssl=1" data-orig-size="1727,787" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="vcsac24rcevval4j_19" data-image-description="" data-image-caption="" data-large-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_19.png?fit=640%2C291&amp;ssl=1" class="aligncenter size-full wp-image-14529" src="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_19.png?resize=640%2C292&#038;ssl=1" alt="" width="640" height="292" srcset="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_19.png?w=1727&amp;ssl=1 1727w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_19.png?resize=595%2C271&amp;ssl=1 595w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_19.png?resize=960%2C437&amp;ssl=1 960w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_19.png?resize=768%2C350&amp;ssl=1 768w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_19.png?resize=1536%2C700&amp;ssl=1 1536w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_19.png?w=1280&amp;ssl=1 1280w" sizes="auto, (max-width: 640px) 100vw, 640px" /></a></p>
<ul>
<li>Para volver al Appliance Shell al iniciar sesión de nuevo, ejecutamos este comando <strong>chsh -s /bin/appliancesh root:</strong></li>
</ul>
<p><a href="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_20.png?ssl=1" data-lbwps-width="763" data-lbwps-height="249" data-lbwps-srcsmall="https://blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_20.png"><img data-recalc-dims="1" loading="lazy" decoding="async" data-attachment-id="14530" data-permalink="https://blog.ragasys.es/vcenter-server-appliance-cve-2021-44228-remote-code-execution-vulnerability-via-apache-log4j/vcsac24rcevval4j_20#main" data-orig-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_20.png?fit=763%2C249&amp;ssl=1" data-orig-size="763,249" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="vcsac24rcevval4j_20" data-image-description="" data-image-caption="" data-large-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_20.png?fit=640%2C209&amp;ssl=1" class="aligncenter size-full wp-image-14530" src="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_20.png?resize=640%2C209&#038;ssl=1" alt="" width="640" height="209" srcset="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_20.png?w=763&amp;ssl=1 763w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_20.png?resize=595%2C194&amp;ssl=1 595w" sizes="auto, (max-width: 640px) 100vw, 640px" /></a></p>
<ul>
<li>Y como vemos, al iniciar sesión de nuevo en nuestro vCenter Server Appliance nos abre el Appliance Shell como al principio:</li>
</ul>
<p><a href="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_21.png?ssl=1" data-lbwps-width="786" data-lbwps-height="335" data-lbwps-srcsmall="https://blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_21.png"><img data-recalc-dims="1" loading="lazy" decoding="async" data-attachment-id="14531" data-permalink="https://blog.ragasys.es/vcenter-server-appliance-cve-2021-44228-remote-code-execution-vulnerability-via-apache-log4j/vcsac24rcevval4j_21#main" data-orig-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_21.png?fit=786%2C335&amp;ssl=1" data-orig-size="786,335" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="vcsac24rcevval4j_21" data-image-description="" data-image-caption="" data-large-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_21.png?fit=640%2C273&amp;ssl=1" class="aligncenter size-full wp-image-14531" src="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_21.png?resize=640%2C273&#038;ssl=1" alt="" width="640" height="273" srcset="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_21.png?w=786&amp;ssl=1 786w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_21.png?resize=595%2C254&amp;ssl=1 595w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2021/12/vcsac24rcevval4j_21.png?resize=768%2C327&amp;ssl=1 768w" sizes="auto, (max-width: 640px) 100vw, 640px" /></a></p>
<p>&nbsp;</p>
<p>Saludos y espero que os sea de ayuda <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f609.png" alt="😉" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>
<p>La entrada <a href="https://blog.ragasys.es/vcenter-server-appliance-cve-2021-44228-remote-code-execution-vulnerability-via-apache-log4j">vCENTER SERVER APPLIANCE &#8211; CVE-2021-44228 y CVE-2021-45046 &#8211; Remote code execution vulnerability via Apache Log4j</a> se publicó primero en <a href="https://blog.ragasys.es">RAGASYS SISTEMAS</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.ragasys.es/vcenter-server-appliance-cve-2021-44228-remote-code-execution-vulnerability-via-apache-log4j/feed</wfw:commentRss>
			<slash:comments>3</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">14503</post-id>	</item>
	</channel>
</rss>
