Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-21975 PoC — VMware vRealize Operations 代码问题漏洞

Source
Associated Vulnerability
Title:VMware vRealize Operations 代码问题漏洞 (CVE-2021-21975)
Description:vmware VMware vRealize Operations是美国威睿(vmware)公司的一个应用程序。一个统一的,基于AI的平台上为私有,混合和多云环境提供自动驾驶的IT运营管理。 VMware vRealize Operations 存在安全漏洞,该漏洞源于更新地址服务器端请求伪造和任意文件写入。
Description
漏洞复现与poc收集,CVE-2021-21975,cve-2021-22005,CVE-2021-26295,VMware vCenter任意文件读取
Readme
## 0x01 注
该项目仅供合法的渗透测试以及爱好者参考学习,请各位遵守《中华人民共和国网络安全法》以及相应地方的法律,禁止使用该项目进行违法操作,否则自行承担相关责任!

## 0x02 VMware
- [**CVE-2021-21975**](https://github.com/TheTh1nk3r/exp_hub/tree/main/VMware) VMware vRealize Operations Manager SSRF漏洞  
- [**vCenter任意文件读取**](https://github.com/TheTh1nk3r/exp_hub/tree/main/VMware) VMware vCenter任意文件读取漏洞 
- [**vCenter任意文件上传**](https://github.com/TheTh1nk3r/exp_hub/blob/main/VMware/cve-2021-22005.py)VMware vCenter任意文件上传漏洞到RCE(cve-2021-22005)

## 0x03 Chrome
- [**chrome 1day poc**](https://github.com/TheTh1nk3r/exp_hub/tree/main/chrome-0day) 影响范围 Chrome 89.0.4389.114 及以下版本与使用Chrome内核的其他浏览器

## 0x04 Apache OFBiz
- [**CVE-2021-26295**](https://github.com/TheTh1nk3r/exp_hub/tree/main/Apache%20OFBiz) Apache OFBiz反序列漏洞(CVE-2021-26295)



















File Snapshot

[4.0K] /data/pocs/4c255eb5a534672c271f332f2c3e8c05cc65dddc ├── [4.0K] Apache OFBiz │   ├── [1.9K] CVE-2021-26295.py │   └── [ 45] README.md ├── [4.0K] chrome-0day │   ├── [5.7K] exploit_2.html │   ├── [ 315] exploit.html │   └── [4.4K] exploit.js ├── [1.0K] README.md └── [4.0K] VMware ├── [2.9K] CVE-2021-21975.py ├── [8.7K] cve-2021-22005.py └── [3.4K] VMware-vCenter-fileRead.py 3 directories, 9 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.