Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-21975 PoC — VMware vRealize Operations 代码问题漏洞

Source
Associated Vulnerability
Title:VMware vRealize Operations 代码问题漏洞 (CVE-2021-21975)
Description:vmware VMware vRealize Operations是美国威睿(vmware)公司的一个应用程序。一个统一的,基于AI的平台上为私有,混合和多云环境提供自动驾驶的IT运营管理。 VMware vRealize Operations 存在安全漏洞,该漏洞源于更新地址服务器端请求伪造和任意文件写入。
Description
Nmap script to check vulnerability CVE-2021-21975
Readme
# CVE-2021-21975
Nmap script to check vulnerability CVE-2021-21975

## Vulnerability References:

https://app.howlermonkey.io/vulnerabilities/CVE-2021-21975

https://www.vmware.com/security/advisories/VMSA-2021-0004.html

## Blog
https://www.guayoyo.io/post/cve-2021-21975-vmware-vrealize-operations-manager-ssrf-lo-que-necesitas-saber

## Example

nmap -p443 --script cve-2021-21975.nse --script-args vulns.showall IP

![CVE-2021-21975](https://user-images.githubusercontent.com/63943179/113367112-8fca1c00-9331-11eb-918a-18cd14ef0e8e.gif)
File Snapshot

[4.0K] /data/pocs/ed60e04bbbba9003458d5975ee2bee7dbe3728e5 ├── [4.4K] cve-2021-21975.nse ├── [ 11K] LICENSE └── [ 541] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.