Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-21972 PoC — VMware vSphere Client 路径遍历漏洞

Source
Associated Vulnerability
Title:VMware vSphere Client 路径遍历漏洞 (CVE-2021-21972)
Description:VMware vSphere Client是美国威睿(VMware)公司的一个应用软件。提供虚拟化管理。 VMware vSphere Client存在路径遍历漏洞,未授权的攻击者可以通过开放443端口的服务器向vCenter Server发送精心构造的请求,从而在目标系统上远程执行恶意代码。以下产品和版本受到影响:vSphere Client 6.5、vSphere Client 6.7、vSphere Client 7.0、VMware Cloud Foundation(vCenter Server)
Description
A vulnerability scanner that detects CVE-2021-21972 vulnerabilities.
Readme
# westone-CVE-2021-21972-scanner  
VMware vCenter Server remote code execution vulnerability.A malicious attacker with access to port 443 can send a carefully constructed request to vCenter Server, which will eventually cause remote arbitrary code execution.  
# Installation & Usage  
git clone https://github.com/Osyanina/westone-CVE-2021-21972-scanner.git  
cd westone-CVE-2021-21972-scanner  
cmd CVE-2021-21972.exe  
# Repair suggestions  
Upgrade from vCenter Server7.0 version to 7.0.U1c  
Upgrade from vCenter Server6.7 version to 6.7.U3l  
Upgrade from vCenter Server6.5 to 6.5 U3n  
File Snapshot

[4.0K] /data/pocs/d415fee1d9169d837409e4f1792745057b480ada └── [ 593] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.