Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-22005 PoC — Vmware VMware vCenter Server 路径遍历漏洞

Source
Associated Vulnerability
Title:Vmware VMware vCenter Server 路径遍历漏洞 (CVE-2021-22005)
Description:VMware vCenter Server是美国威睿(VMware)公司的一套服务器和虚拟化管理软件。该软件提供了一个用于管理VMware vSphere环境的集中式平台,可自动实施和交付虚拟基础架构。 VMware vCenter Server 存在路径遍历漏洞,该漏洞源于在Analytics服务中上传文件时文件验证不足导致。未经身份验证的攻击者可以通过网络访问443端口,在目标系统上传和执行任意文件。
Description
CVE-2021-22005批量验证python脚本
Readme
# CVE-2021-22005-
CVE-2021-22005批量验证python脚本

运行环境:python3

运行:将要验证的url放入一个文本文件,例如url.txt,再运行 python3 url.txt即可 
File Snapshot

[4.0K] /data/pocs/b07dd6295da8f693e1b1ea217b41949bfc65fbec ├── [1.1K] poc.py ├── [ 185] README.md └── [ 52] url.txt 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.