Enhancement: cves/2021/CVE-2021-22054.yaml by mp
parent
9af88a1ad5
commit
ece66c281b
|
@ -1,14 +1,14 @@
|
||||||
id: CVE-2021-22054
|
id: CVE-2021-22054
|
||||||
|
|
||||||
info:
|
info:
|
||||||
name: VMWare Workspace One UEM SSRF
|
name: VMWare Workspace ONE UEM - Server-Side Request Forgery
|
||||||
author: h1ei1
|
author: h1ei1
|
||||||
severity: high
|
severity: high
|
||||||
description: VMware Workspace ONE UEM console 20.0.8 prior to 20.0.8.37, 20.11.0 prior to 20.11.0.40, 21.2.0 prior to 21.2.0.27, and 21.5.0 prior to 21.5.0.37 contain an SSRF vulnerability. This issue may allow a malicious actor with network access to UEM to send their requests without authentication and to gain access to sensitive information.
|
description: VMware Workspace ONE UEM console 20.0.8 prior to 20.0.8.37, 20.11.0 prior to 20.11.0.40, 21.2.0 prior to 21.2.0.27, and 21.5.0 prior to 21.5.0.37 contain a server-side request forgery vulnerability. This issue may allow a malicious actor with network access to UEM to send their requests without authentication and to gain access to sensitive information.
|
||||||
reference:
|
reference:
|
||||||
- https://blog.assetnote.io/2022/04/27/vmware-workspace-one-uem-ssrf/
|
- https://blog.assetnote.io/2022/04/27/vmware-workspace-one-uem-ssrf/
|
||||||
- https://nvd.nist.gov/vuln/detail/CVE-2021-22054
|
|
||||||
- https://www.vmware.com/security/advisories/VMSA-2021-0029.html
|
- https://www.vmware.com/security/advisories/VMSA-2021-0029.html
|
||||||
|
- https://nvd.nist.gov/vuln/detail/CVE-2021-22054
|
||||||
classification:
|
classification:
|
||||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
|
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
|
||||||
cvss-score: 7.5
|
cvss-score: 7.5
|
||||||
|
@ -32,3 +32,5 @@ requests:
|
||||||
- type: word
|
- type: word
|
||||||
words:
|
words:
|
||||||
- "<h1> Interactsh Server </h1>"
|
- "<h1> Interactsh Server </h1>"
|
||||||
|
|
||||||
|
# Enhanced by mp on 2022/06/27
|
||||||
|
|
Loading…
Reference in New Issue