From 2f4bdee98a92da985c4813f8e89334f60b9ade2c Mon Sep 17 00:00:00 2001 From: Go0p Date: Tue, 16 Mar 2021 16:18:33 +0800 Subject: [PATCH] update CVE-2021-21978 --- VMware/CVE-2021-21978/README.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/VMware/CVE-2021-21978/README.md b/VMware/CVE-2021-21978/README.md index 7d5b24a..4946fcc 100644 --- a/VMware/CVE-2021-21978/README.md +++ b/VMware/CVE-2021-21978/README.md @@ -1,10 +1,10 @@ # VMware View Planner RCE (CVE-2021-21978) -Description": "VMware View Planner 4.x prior to 4.6 Security Patch 1 contains a remote code execution vulnerability. Improper input validation and lack of authorization leading to arbitrary file upload in logupload web application. An unauthorized attacker with network access to View Planner Harness could upload and execute a specially crafted file leading to remote code execution within the logupload container. +VMware View Planner 4.x prior to 4.6 Security Patch 1 contains a remote code execution vulnerability. Improper input validation and lack of authorization leading to arbitrary file upload in logupload web application. An unauthorized attacker with network access to View Planner Harness could upload and execute a specially crafted file leading to remote code execution within the logupload container. -**Affected version**: VMware +**Affected version**: VMware View Planner 4.x - 4.6 -**[FOFA](https://fofa.so/result?q=app%3D%22VMware-vCenter%22+%7C%7C+app%3D%22VMware-VirtualCenter%22&qbase64=YXBwPSJWTXdhcmUtdkNlbnRlciIgfHwgYXBwPSJWTXdhcmUtVmlydHVhbENlbnRlciI%3D&file=&file=) query rule**: title=\"Viewplanner" +**[FOFA](https://fofa.so/result?q=title%3D%22Viewplanner%22&qbase64=dGl0bGU9IlZpZXdwbGFubmVyIg%3D%3D&file=&file=) query rule**: title="Viewplanner" # Demo