diff --git a/VMware/CVE-2021-21972/README.md b/VMware/CVE-2021-21972/README.md new file mode 100644 index 0000000..362c519 --- /dev/null +++ b/VMware/CVE-2021-21972/README.md @@ -0,0 +1,11 @@ +# CVE-2021-21972 VMware vCenter Server RCE + +The vSphere Client (HTML5) contains a remote code execution vulnerability in a vCenter Server plugin. A malicious actor with network access to port 443 may exploit this issue to execute commands with unrestricted privileges on the underlying operating system that hosts vCenter Server. This affects VMware vCenter Server (7.x before 7.0 U1c, 6.7 before 6.7 U3l and 6.5 before 6.5 U3n) and VMware Cloud Foundation (4.x before 4.2 and 3.x before 3.10.1.2). + +**Affected version**: VMware vCenter + +**[FOFA](https://fofa.so/result?q=app%3D%22VMware-vCenter%22+%7C%7C+app%3D%22VMware-VirtualCenter%22&qbase64=YXBwPSJWTXdhcmUtdkNlbnRlciIgfHwgYXBwPSJWTXdhcmUtVmlydHVhbENlbnRlciI%3D&file=&file=) query rule**: app="VMware-VirtualCenter" || app="VMware-vCenter" + +# Demo + +![](VMware_vCenter_Server_RCE_CVE_2021_21972.gif) \ No newline at end of file diff --git a/VMware/CVE-2021-21972/VMware_vCenter_Server_RCE_CVE_2021_21972.gif b/VMware/CVE-2021-21972/VMware_vCenter_Server_RCE_CVE_2021_21972.gif new file mode 100644 index 0000000..8d28400 Binary files /dev/null and b/VMware/CVE-2021-21972/VMware_vCenter_Server_RCE_CVE_2021_21972.gif differ