Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-21972 PoC — VMware vSphere Client 路径遍历漏洞

Source
Associated Vulnerability
Title:VMware vSphere Client 路径遍历漏洞 (CVE-2021-21972)
Description:VMware vSphere Client是美国威睿(VMware)公司的一个应用软件。提供虚拟化管理。 VMware vSphere Client存在路径遍历漏洞,未授权的攻击者可以通过开放443端口的服务器向vCenter Server发送精心构造的请求,从而在目标系统上远程执行恶意代码。以下产品和版本受到影响:vSphere Client 6.5、vSphere Client 6.7、vSphere Client 7.0、VMware Cloud Foundation(vCenter Server)
Description
VMware vCenter 未授权RCE(CVE-2021-21972)
Readme
### VMware_vCenter_UNAuthorized_RCE_CVE-2021-21972

**zoomeye dork:app:"VMware vCenter"**

![](images/1.png)

使用pocsuite3编写的无害检测脚本[VMware_vCenter_UNAuthorized_RCE.py](https://github.com/conjojo/VMware_vCenter_UNAuthorized_RCE_CVE-2021-21972/blob/master/VMware_vCenter_UNAuthorized_RCE.py),使用近一年的数据进行探测:
![](images/2.png)


**成功率约为:1551 / 3998 = 39%**
File Snapshot

[4.0K] /data/pocs/34d1e039277143ae1555c415b929ac8cd8fc38fb ├── [4.0K] images │   ├── [154K] 1.png │   └── [149K] 2.png ├── [ 414] README.md └── [1.4K] VMware_vCenter_UNAuthorized_RCE.py 1 directory, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.