From 4add30483737297c46a245d7e9a060e7bbc9bf2e Mon Sep 17 00:00:00 2001 From: Ritik Chaddha Date: Sat, 16 Jul 2022 22:35:37 +0530 Subject: [PATCH] Update vmware-vcenter-log4j-jndi-rce.yaml --- .../vmware/vmware-vcenter-log4j-jndi-rce.yaml | 9 ++++++--- 1 file changed, 6 insertions(+), 3 deletions(-) diff --git a/vulnerabilities/vmware/vmware-vcenter-log4j-jndi-rce.yaml b/vulnerabilities/vmware/vmware-vcenter-log4j-jndi-rce.yaml index b231e287be..86faa3f095 100644 --- a/vulnerabilities/vmware/vmware-vcenter-log4j-jndi-rce.yaml +++ b/vulnerabilities/vmware/vmware-vcenter-log4j-jndi-rce.yaml @@ -3,13 +3,16 @@ id: vmware-vcenter-log4j-jndi-rce info: name: VMware VCenter Log4j JNDI RCE author: _0xf4n9x_ - severity: high - description: A critical vulnerability in Apache Log4j identified by CVE-2021-44228 has been publicly disclosed that may allow for remote code execution in impacted VMware VCenter. + severity: critical + description: | + A critical vulnerability in Apache Log4j identified by CVE-2021-44228 has been publicly disclosed that may allow for remote code execution in impacted VMware VCenter. reference: - https://www.vmware.com/security/advisories/VMSA-2021-0028.html - https://github.com/advisories/GHSA-jfh8-c2jp-5v3q - https://twitter.com/tnpitsecurity/status/1469429810216771589 - tags: rce,jndi,log4j,vcenter,vmware + - https://logging.apache.org/log4j/2.x/security.html + - https://nvd.nist.gov/vuln/detail/CVE-2021-44228 + tags: cve,cve2021,rce,jndi,log4j,vcenter,vmware,oast requests: - raw: