nuclei-templates/http/cves/2021/CVE-2021-22005.yaml

52 lines
1.8 KiB
YAML

id: CVE-2021-22005
info:
name: VMware vCenter Server - Arbitrary File Upload
author: PR3R00T
severity: critical
description: VMware vCenter Server contains an arbitrary file upload vulnerability in the Analytics service. A malicious actor with network access to port 443 on vCenter Server may exploit this issue to execute code on vCenter Server by uploading a specially crafted file.
remediation: |
Apply the necessary security patches or updates provided by VMware
reference:
- https://kb.vmware.com/s/article/85717
- https://www.vmware.com/security/advisories/VMSA-2021-0020.html
- https://core.vmware.com/vmsa-2021-0020-questions-answers-faq
- https://nvd.nist.gov/vuln/detail/CVE-2021-22005
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2021-22005
cwe-id: CWE-22
epss-score: 0.96983
epss-percentile: 0.99665
cpe: cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*
metadata:
max-request: 2
vendor: vmware
product: cloud_foundation
tags: cve,cve2021,vmware,vcenter,fileupload,kev,intrusive
http:
- raw:
- |
GET / HTTP/1.1
Host: {{Hostname}}
- |
POST /analytics/telemetry/ph/api/hyper/send?_c&_i=test HTTP/1.1
Host: {{Hostname}}
Content-Type: application/json
test_data
req-condition: true
matchers:
- type: dsl
dsl:
- "status_code_1 == 200"
- "status_code_2 == 201"
- "contains(body_1, 'VMware vSphere')"
- "content_length_2 == 0"
condition: and
# digest: 490a00463044022075045c75664e29bb7585482ae351d83802dab8ef62d1dcc6900b5e4dace4ee0d02201b5600dd116ce161e020ea311ee6cd08a57c62680cc77cb86c2e109c7bb2cfae:922c64590222798bb761d5b6d8e72950