mirror of
https://github.com/gobysec/GobyVuls.git
synced 2025-06-20 18:00:22 +00:00
add CVE-2021-21972
This commit is contained in:
parent
535c249010
commit
a0a7c07e24
11
VMware/CVE-2021-21972/README.md
Normal file
11
VMware/CVE-2021-21972/README.md
Normal file
@ -0,0 +1,11 @@
|
|||||||
|
# CVE-2021-21972 VMware vCenter Server RCE
|
||||||
|
|
||||||
|
The vSphere Client (HTML5) contains a remote code execution vulnerability in a vCenter Server plugin. A malicious actor with network access to port 443 may exploit this issue to execute commands with unrestricted privileges on the underlying operating system that hosts vCenter Server. This affects VMware vCenter Server (7.x before 7.0 U1c, 6.7 before 6.7 U3l and 6.5 before 6.5 U3n) and VMware Cloud Foundation (4.x before 4.2 and 3.x before 3.10.1.2).
|
||||||
|
|
||||||
|
**Affected version**: VMware vCenter
|
||||||
|
|
||||||
|
**[FOFA](https://fofa.so/result?q=app%3D%22VMware-vCenter%22+%7C%7C+app%3D%22VMware-VirtualCenter%22&qbase64=YXBwPSJWTXdhcmUtdkNlbnRlciIgfHwgYXBwPSJWTXdhcmUtVmlydHVhbENlbnRlciI%3D&file=&file=) query rule**: app="VMware-VirtualCenter" || app="VMware-vCenter"
|
||||||
|
|
||||||
|
# Demo
|
||||||
|
|
||||||
|

|
Binary file not shown.
After Width: | Height: | Size: 470 KiB |
Loading…
x
Reference in New Issue
Block a user