From f62545e922eff8deafec1f31c76d0a0690d98ce4 Mon Sep 17 00:00:00 2001 From: MostInterestingBotInTheWorld <98333686+MostInterestingBotInTheWorld@users.noreply.github.com> Date: Thu, 5 May 2022 14:23:25 -0400 Subject: [PATCH] Enhancement: cves/2021/CVE-2021-22005.yaml by mp --- cves/2021/CVE-2021-22005.yaml | 8 +++++--- 1 file changed, 5 insertions(+), 3 deletions(-) diff --git a/cves/2021/CVE-2021-22005.yaml b/cves/2021/CVE-2021-22005.yaml index 12f9e4770e..12606d2108 100644 --- a/cves/2021/CVE-2021-22005.yaml +++ b/cves/2021/CVE-2021-22005.yaml @@ -1,15 +1,15 @@ id: CVE-2021-22005 info: - name: VMware vCenter Server file upload vulnerability + name: VMware vCenter Server - Arbitrary File Upload author: PR3R00T severity: critical - description: The vCenter Server contains an arbitrary file upload vulnerability in the Analytics service. VMware has evaluated the severity of this issue to be in the Critical severity range with a maximum CVSSv3 - base score of 9.8. + description: VMware vCenter Server contains an arbitrary file upload vulnerability in the Analytics service. A malicious actor with network access to port 443 on vCenter Server may exploit this issue to execute code on vCenter Server by uploading a specially crafted file. reference: - https://kb.vmware.com/s/article/85717 - https://www.vmware.com/security/advisories/VMSA-2021-0020.html - https://core.vmware.com/vmsa-2021-0020-questions-answers-faq + - https://nvd.nist.gov/vuln/detail/CVE-2021-22005 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 @@ -39,3 +39,5 @@ requests: - "contains(body_1, 'VMware vSphere')" - "content_length_2 == 0" condition: and + +# Enhanced by mp on 2022/05/05