Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-21972 PoC — VMware vSphere Client 路径遍历漏洞

Source
Associated Vulnerability
Title:VMware vSphere Client 路径遍历漏洞 (CVE-2021-21972)
Description:VMware vSphere Client是美国威睿(VMware)公司的一个应用软件。提供虚拟化管理。 VMware vSphere Client存在路径遍历漏洞,未授权的攻击者可以通过开放443端口的服务器向vCenter Server发送精心构造的请求,从而在目标系统上远程执行恶意代码。以下产品和版本受到影响:vSphere Client 6.5、vSphere Client 6.7、vSphere Client 7.0、VMware Cloud Foundation(vCenter Server)
Description
VMware vCenter Server远程代码执行漏洞 (CVE-2021-21972)批量检测脚本
Readme
## 使用方法&免责声明

VMware vCenter Server远程代码执行漏洞 (CVE-2021-21972)

使用方法:`Python CVE-2021-21972.py urls.txt`

urls.txt 中每个url为一行,漏洞地址输出在vul.txt中

##### 影响版本:

VMware vCenter Server 7.0系列 < 7.0.U1c

VMware vCenter Server 6.7系列 < 6.7.U3l

VMware vCenter Server 6.5系列 < 6.5 U3n



工具仅用于安全人员安全测试,任何未授权检测造成的直接或者间接的后果及损失,均由使用者本人负责
File Snapshot

[4.0K] /data/pocs/bd44eca923978bf63b9a89a5c58575d74c95b059 ├── [ 78K] CVE-2021-21972.png ├── [2.1K] CVE-2021-21972.py ├── [ 522] README.md └── [ 40] urls.txt 0 directories, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.