id: CVE-2021-22005 info: name: VMware vCenter Server - Arbitrary File Upload author: PR3R00T severity: critical description: VMware vCenter Server contains an arbitrary file upload vulnerability in the Analytics service. A malicious actor with network access to port 443 on vCenter Server may exploit this issue to execute code on vCenter Server by uploading a specially crafted file. remediation: | Apply the necessary security patches or updates provided by VMware reference: - https://kb.vmware.com/s/article/85717 - https://www.vmware.com/security/advisories/VMSA-2021-0020.html - https://core.vmware.com/vmsa-2021-0020-questions-answers-faq - https://nvd.nist.gov/vuln/detail/CVE-2021-22005 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2021-22005 cwe-id: CWE-22 epss-score: 0.97096 epss-percentile: 0.997 cpe: cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:* metadata: max-request: 2 vendor: vmware product: cloud_foundation tags: cve,cve2021,vmware,vcenter,fileupload,kev,intrusive http: - raw: - | GET / HTTP/1.1 Host: {{Hostname}} - | POST /analytics/telemetry/ph/api/hyper/send?_c&_i=test HTTP/1.1 Host: {{Hostname}} Content-Type: application/json test_data req-condition: true matchers: - type: dsl dsl: - "status_code_1 == 200" - "status_code_2 == 201" - "contains(body_1, 'VMware vSphere')" - "content_length_2 == 0" condition: and # digest: 4b0a00483046022100ae2b7c6e5e873d7f9bfbf7707384644f85d66955e0ff7cc3ac18f7752bb40fdd022100a3667afeb980e66317ab2cc4c3293bf4e4fe2d3fb6876163fcaf3047cf6ee4e2:922c64590222798bb761d5b6d8e72950