id: CVE-2021-22005 info: name: VMware vCenter Server - Arbitrary File Upload author: PR3R00T severity: critical description: VMware vCenter Server contains an arbitrary file upload vulnerability in the Analytics service. A malicious actor with network access to port 443 on vCenter Server may exploit this issue to execute code on vCenter Server by uploading a specially crafted file. remediation: | Apply the necessary security patches or updates provided by VMware reference: - https://kb.vmware.com/s/article/85717 - https://www.vmware.com/security/advisories/VMSA-2021-0020.html - https://core.vmware.com/vmsa-2021-0020-questions-answers-faq - https://nvd.nist.gov/vuln/detail/CVE-2021-22005 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2021-22005 cwe-id: CWE-22 epss-score: 0.97096 epss-percentile: 0.99698 cpe: cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:* metadata: max-request: 2 vendor: vmware product: cloud_foundation tags: cve,cve2021,vmware,vcenter,fileupload,kev,intrusive http: - raw: - | GET / HTTP/1.1 Host: {{Hostname}} - | POST /analytics/telemetry/ph/api/hyper/send?_c&_i=test HTTP/1.1 Host: {{Hostname}} Content-Type: application/json test_data req-condition: true matchers: - type: dsl dsl: - "status_code_1 == 200" - "status_code_2 == 201" - "contains(body_1, 'VMware vSphere')" - "content_length_2 == 0" condition: and # digest: 490a004630440220404722b16705a1e789101795b93da2e56e1fb7db4ab132a90906b86c2fda63f10220103169cc3ffa4bbbe66016c62c7e87ae76f1985ff7e55319bd9dd8670e0327d6:922c64590222798bb761d5b6d8e72950