Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2021-22005
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
The vCenter Server contains an arbitrary file upload vulnerability in the Analytics service. A malicious actor with network access to port 443 on vCenter Server may exploit this issue to execute code on vCenter Server by uploading a specially crafted file.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Vmware VMware vCenter Server 路径遍历漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
VMware vCenter Server是美国威睿(VMware)公司的一套服务器和虚拟化管理软件。该软件提供了一个用于管理VMware vSphere环境的集中式平台,可自动实施和交付虚拟基础架构。 VMware vCenter Server 存在路径遍历漏洞,该漏洞源于在Analytics服务中上传文件时文件验证不足导致。未经身份验证的攻击者可以通过网络访问443端口,在目标系统上传和执行任意文件。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
-VMware vCenter Server, VMware Cloud Foundation VMware vCenter Server(7.x before 7.0 U2c and 6.7 before 6.7 U3o) and VMware Cloud Foundation (4.x before 4.3 and 3.x before 3.10.2.2) -
II. Public POCs for CVE-2021-22005
#POC DescriptionSource LinkShenlong Link
1Nonehttps://github.com/1ZRR4H/CVE-2021-22005POC Details
2Nonehttps://github.com/pisut4152/Sigma-Rule-for-CVE-2021-22005-scanning-activityPOC Details
3CVE-2021-22005https://github.com/X1pe0/VMWare-CVE-CheckPOC Details
4CVE-2021-22005批量验证python脚本https://github.com/5gstudent/CVE-2021-22005-POC Details
5CVE-2021-22005_PoChttps://github.com/RedTeamExp/CVE-2021-22005_PoCPOC Details
6Nonehttps://github.com/rwincey/CVE-2021-22005POC Details
7the metasploit script(POC/EXP) about CVE-2021-22005 VMware vCenter Server contains an arbitrary file upload vulnerabilityhttps://github.com/TaroballzChen/CVE-2021-22005-metasploitPOC Details
8Nonehttps://github.com/TiagoSergio/CVE-2021-22005POC Details
9VMware vCenter Server任意文件上传漏洞 / Code By:Jun_shenghttps://github.com/Jun-5heng/CVE-2021-22005POC Details
10Nonehttps://github.com/shmilylty/cve-2021-22005-expPOC Details
11Clone from gisthttps://github.com/timb-machine-mirrors/testanull-CVE-2021-22005.pyPOC Details
12cve-2021-22005vcenter任意文件上传漏洞,可直接上传冰蝎https://github.com/InventorMAO/cve-2021-22005POC Details
13Nonehttps://github.com/tiagob0b/CVE-2021-22005POC Details
14CVE-2021-22005https://github.com/Jeromeyoung/VMWare-CVE-CheckPOC Details
15VMware vCenter Server contains an arbitrary file upload vulnerability in the Analytics service. A malicious actor with network access to port 443 on vCenter Server may exploit this issue to execute code on vCenter Server by uploading a specially crafted file.https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2021/CVE-2021-22005.yamlPOC Details
16Nonehttps://github.com/Threekiii/Awesome-POC/blob/master/%E4%BA%91%E5%AE%89%E5%85%A8%E6%BC%8F%E6%B4%9E/VMware%20vCenter%20Server%20%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E%20CVE-2021-22005.mdPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2021-22005
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2021-22005

No comments yet


Leave a comment