Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-21972 PoC — VMware vSphere Client 路径遍历漏洞

Source
Associated Vulnerability
Title:VMware vSphere Client 路径遍历漏洞 (CVE-2021-21972)
Description:VMware vSphere Client是美国威睿(VMware)公司的一个应用软件。提供虚拟化管理。 VMware vSphere Client存在路径遍历漏洞,未授权的攻击者可以通过开放443端口的服务器向vCenter Server发送精心构造的请求,从而在目标系统上远程执行恶意代码。以下产品和版本受到影响:vSphere Client 6.5、vSphere Client 6.7、vSphere Client 7.0、VMware Cloud Foundation(vCenter Server)
Description
Nmap script to check vulnerability CVE-2021-21972
Readme
# CVE-2021-21972
Nmap script to check vulnerability CVE-2021-21972 - vCenter Server RCE

## Vulnerability References:

https://app.howlermonkey.io/vulnerabilities/CVE-2021-21972

https://www.vmware.com/security/advisories/VMSA-2021-0002.html


## Example

nmap -p443 --script cve-2021-21972.nse --script-args vulns.showall IP

![final_603e5630e2c0df009ad51383_569264](https://user-images.githubusercontent.com/63943179/109674961-1c789300-7b56-11eb-891c-abd1078ae5dd.gif)



## Credits

Built on top of the script develop by Alex Hernandez aka [@alt3kx](https://github.com/alt3kx) - [https://github.com/alt3kx/CVE-2021-21972](https://github.com/alt3kx/CVE-2021-21972)
File Snapshot

[4.0K] /data/pocs/1b281e6f6ef373513877e4fada8e7ff8c80d01ec ├── [4.0K] cve-2021-21972.nse ├── [ 11K] LICENSE └── [ 667] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.