id: CVE-2021-22005 info: name: VMware vCenter Server - Arbitrary File Upload author: PR3R00T severity: critical description: VMware vCenter Server contains an arbitrary file upload vulnerability in the Analytics service. A malicious actor with network access to port 443 on vCenter Server may exploit this issue to execute code on vCenter Server by uploading a specially crafted file. remediation: | Apply the necessary security patches or updates provided by VMware reference: - https://kb.vmware.com/s/article/85717 - https://www.vmware.com/security/advisories/VMSA-2021-0020.html - https://core.vmware.com/vmsa-2021-0020-questions-answers-faq - https://nvd.nist.gov/vuln/detail/CVE-2021-22005 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2021-22005 cwe-id: CWE-22 epss-score: 0.97096 epss-percentile: 0.99699 cpe: cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:* metadata: max-request: 2 vendor: vmware product: cloud_foundation tags: cve,cve2021,vmware,vcenter,fileupload,kev,intrusive http: - raw: - | GET / HTTP/1.1 Host: {{Hostname}} - | POST /analytics/telemetry/ph/api/hyper/send?_c&_i=test HTTP/1.1 Host: {{Hostname}} Content-Type: application/json test_data req-condition: true matchers: - type: dsl dsl: - "status_code_1 == 200" - "status_code_2 == 201" - "contains(body_1, 'VMware vSphere')" - "content_length_2 == 0" condition: and # digest: 4a0a0047304502201aee6af12dec34d37b7e8ac0010b55bcb55aeee1da57c3cd649dd950483c4e9f0221008f8b8080ef71f59748b87b2a867cb30d9369d7fa131d23157ec2bb08a37d1f74:922c64590222798bb761d5b6d8e72950