cve/2021/CVE-2021-21973.md

51 lines
2.5 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2021-21973](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21973)
![](https://img.shields.io/static/v1?label=Product&message=VMware%20Cloud%20Foundation&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=VMware%20vCenter%20Server&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=SSRF%20vulnerability&color=brighgreen)
### Description
The vSphere Client (HTML5) contains an SSRF (Server Side Request Forgery) vulnerability due to improper validation of URLs in a vCenter Server plugin. A malicious actor with network access to port 443 may exploit this issue by sending a POST request to vCenter Server plugin leading to information disclosure. This affects: VMware vCenter Server (7.x before 7.0 U1c, 6.7 before 6.7 U3l and 6.5 before 6.5 U3n) and VMware Cloud Foundation (4.x before 4.2 and 3.x before 3.10.1.2).
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/0day404/vulnerability-poc
- https://github.com/ARPSyndicate/cvemon
- https://github.com/ARPSyndicate/kenzer-templates
- https://github.com/DaveCrown/vmware-kb82374
- https://github.com/EdgeSecurityTeam/Vulnerability
- https://github.com/KayCHENvip/vulnerability-poc
- https://github.com/NaInSec/CVE-PoC-in-GitHub
- https://github.com/Ostorlab/KEV
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
- https://github.com/SYRTI/POC_to_review
- https://github.com/SexyBeast233/SecBooks
- https://github.com/Threekiii/Awesome-POC
- https://github.com/WhooAmii/POC_to_review
- https://github.com/byteofandri/CVE-2021-21972
- https://github.com/byteofjoshua/CVE-2021-21972
- https://github.com/d4n-sec/d4n-sec.github.io
- https://github.com/freakanonymous/CVE-2021-21973-Automateme
- https://github.com/iamramahibrah/NSE-Scripts
- https://github.com/k0mi-tg/CVE-POC
- https://github.com/manas3c/CVE-POC
- https://github.com/murataydemir/CVE-2021-21972
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/orangmuda/CVE-2021-21972
- https://github.com/pen4uin/awesome-vulnerability-research
- https://github.com/pen4uin/vulnerability-research
- https://github.com/pen4uin/vulnerability-research-list
- https://github.com/psc4re/NSE-scripts
- https://github.com/soosmile/POC
- https://github.com/trhacknon/Pocingit
- https://github.com/tzwlhack/Vulnerability
- https://github.com/whoforget/CVE-POC
- https://github.com/youwizard/CVE-POC
- https://github.com/zecool/cve