Proof on Concept Exploit for CVE-2021-38647 (OMIGOD)
For background information and context, read the our blog post detailing this vulnerability: https://www.horizon3.ai/news/blog/omigod
CVE-2021-38647 is an unauthenticated RCE vulnerability effecting the OMI agent as root.
OMI agents are commonly found installed on Azure Linux servers when the following are in use:
- Azure Automation
- Azure Automatic Update
- Azure Operations Management Suite
- Azure Log Analytics
- Azure Configuration Management
- Azure Diagnostics
azureuser@linux:~$ python3 omigod.py -t 10.0.0.5 -c id
uid=0(root) gid=0(root) groups=0(root)
Update and ensure the OMI agent is at version 1.6.8.1.
- For Debian systems (e.g., Ubuntu):
dpkg -l omi
- For Redhat based system (e.g., Fedora, CentOS, RHEL):
rpm -qa omi
For more details see the original researchers' work: https://www.wiz.io/blog/omigod-critical-vulnerabilities-in-omi-azure
This software has been created purely for the purposes of academic research and for the development of effective defensive techniques, and is not intended to be used to attack systems except where explicitly authorized. Project maintainers are not responsible or liable for misuse of the software. Use responsibly.