Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-21972 PoC — VMware vSphere Client 路径遍历漏洞

Source
Associated Vulnerability
Title:VMware vSphere Client 路径遍历漏洞 (CVE-2021-21972)
Description:VMware vSphere Client是美国威睿(VMware)公司的一个应用软件。提供虚拟化管理。 VMware vSphere Client存在路径遍历漏洞,未授权的攻击者可以通过开放443端口的服务器向vCenter Server发送精心构造的请求,从而在目标系统上远程执行恶意代码。以下产品和版本受到影响:vSphere Client 6.5、vSphere Client 6.7、vSphere Client 7.0、VMware Cloud Foundation(vCenter Server)
Readme
# Usage:CVE-2021-21972.py [option]
- -u or --url:目标url
- -t or --type:Payload类型(ssh/webshell)
- -f or --file:要上传的文件(webshell或authorized_keys)	例如:CVE-2021-21972.py -u https://127.0.0.1 -t webshell -f shell.jsp
- -p or --proxy:设置代理	例如:CVE-2021-21972.py -u https://127.0.0.1 -t webshell -f shell.jsp -p https://127.0.0.1:8080
- -l or --list:批量检测	例如:CVE-2021-21972.py -l list.txt -t webshell -f shell.jsp
File Snapshot

[4.0K] /data/pocs/81d9c3b0274330f4d0773b06befd2e873ab2111d ├── [3.4K] CVE-2021-21972.py └── [ 473] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.