nuclei-templates/http/cves/2021/CVE-2021-22005.yaml

49 lines
1.7 KiB
YAML

id: CVE-2021-22005
info:
name: VMware vCenter Server - Arbitrary File Upload
author: PR3R00T
severity: critical
description: VMware vCenter Server contains an arbitrary file upload vulnerability in the Analytics service. A malicious actor with network access to port 443 on vCenter Server may exploit this issue to execute code on vCenter Server by uploading a specially crafted file.
remediation: |
Apply the necessary security patches or updates provided by VMware
reference:
- https://kb.vmware.com/s/article/85717
- https://www.vmware.com/security/advisories/VMSA-2021-0020.html
- https://core.vmware.com/vmsa-2021-0020-questions-answers-faq
- https://nvd.nist.gov/vuln/detail/CVE-2021-22005
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2021-22005
cwe-id: CWE-22
epss-score: 0.96983
epss-percentile: 0.99673
cpe: cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*
metadata:
max-request: 2
vendor: vmware
product: cloud_foundation
tags: cve,cve2021,vmware,vcenter,fileupload,kev,intrusive
http:
- raw:
- |
GET / HTTP/1.1
Host: {{Hostname}}
- |
POST /analytics/telemetry/ph/api/hyper/send?_c&_i=test HTTP/1.1
Host: {{Hostname}}
Content-Type: application/json
test_data
matchers:
- type: dsl
dsl:
- "status_code_1 == 200"
- "status_code_2 == 201"
- "contains(body_1, 'VMware vSphere')"
- "content_length_2 == 0"
condition: and
# digest: 4a0a0047304502210094e2ce51326ad7fb67c1463c40c46805fe884407288b7fb83c5fe6267d08d7790220356156335a97239c836f8db09143b9dec80e522986aef8ba44b88d289bf592c9:922c64590222798bb761d5b6d8e72950