Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-21972 PoC — VMware vSphere Client 路径遍历漏洞

Source
Associated Vulnerability
Title:VMware vSphere Client 路径遍历漏洞 (CVE-2021-21972)
Description:VMware vSphere Client是美国威睿(VMware)公司的一个应用软件。提供虚拟化管理。 VMware vSphere Client存在路径遍历漏洞,未授权的攻击者可以通过开放443端口的服务器向vCenter Server发送精心构造的请求,从而在目标系统上远程执行恶意代码。以下产品和版本受到影响:vSphere Client 6.5、vSphere Client 6.7、vSphere Client 7.0、VMware Cloud Foundation(vCenter Server)
Readme
# CVE-2021-21972

### 漏洞描述

cve-2021-21972代码执行漏洞

具有443端口访问权限的恶意攻击者可以通过向`vCenter Server`发送精心构造的请求,最终造成远程任意代码执行。

### 漏洞检测

1、漏洞为任意文件上传

2、漏洞存在的接口为

`/ui/vropspluginui/rest/services/uploadova`,

完整路径

`https://domain.com/ui/vropspluginui/rest/services/uploadova`

### 修复建议

\- `vCenter Server`7.0版本升级到7.0.U1c

\- `vCenter Server`6.7版本升级到6.7.U3l

\- `vCenter Server`6.5版本升级到6.5 U3n
File Snapshot

[4.0K] /data/pocs/02cf18044105e607d753609087616ac778dd7fcb ├── [2.2K] CVE-2021-21972.py ├── [ 577] README.md └── [ 38] url.txt 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.