OMIGOD

Proof on Concept Exploit for CVE-2021-38647 (OMIGOD)

For background information and context, read the our blog post detailing this vulnerability: https://www.horizon3.ai/news/blog/omigod

Details

CVE-2021-38647 is an unauthenticated RCE vulnerability effecting the OMI agent as root.

OMI agents are commonly found installed on Azure Linux servers when the following are in use:

  • Azure Automation
  • Azure Automatic Update
  • Azure Operations Management Suite
  • Azure Log Analytics
  • Azure Configuration Management
  • Azure Diagnostics

Usage

[email protected]:~$ python3 omigod.py -t 10.0.0.5 -c id
uid=0(root) gid=0(root) groups=0(root)

Example Output

Proof

Mitigations

Update and ensure the OMI agent is at version 1.6.8.1.

  • For Debian systems (e.g., Ubuntu): dpkg -l omi
  • For Redhat based system (e.g., Fedora, CentOS, RHEL): rpm -qa omi

Prior Research Credit

For more details see the original researchers’ work:

Disclaimer

This software has been created purely for the purposes of academic research and for the development of effective defensive techniques, and is not intended to be used to attack systems except where explicitly authorized. Project maintainers are not responsible or liable for misuse of the software. Use responsibly.

GitHub

https://github.com/horizon3ai/CVE-2021-38647