Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-22005

KEV · Ransomware EPSS 94.46% · P100
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2021-22005

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
The vCenter Server contains an arbitrary file upload vulnerability in the Analytics service. A malicious actor with network access to port 443 on vCenter Server may exploit this issue to execute code on vCenter Server by uploading a specially crafted file.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Vmware VMware vCenter Server 路径遍历漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
VMware vCenter Server是美国威睿(VMware)公司的一套服务器和虚拟化管理软件。该软件提供了一个用于管理VMware vSphere环境的集中式平台,可自动实施和交付虚拟基础架构。 VMware vCenter Server 存在路径遍历漏洞,该漏洞源于在Analytics服务中上传文件时文件验证不足导致。未经身份验证的攻击者可以通过网络访问443端口,在目标系统上传和执行任意文件。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
-VMware vCenter Server, VMware Cloud Foundation VMware vCenter Server(7.x before 7.0 U2c and 6.7 before 6.7 U3o) and VMware Cloud Foundation (4.x before 4.3 and 3.x before 3.10.2.2) -

II. Public POCs for CVE-2021-22005

#POC DescriptionSource LinkShenlong Link
1Nonehttps://github.com/1ZRR4H/CVE-2021-22005POC Details
2Nonehttps://github.com/pisut4152/Sigma-Rule-for-CVE-2021-22005-scanning-activityPOC Details
3CVE-2021-22005https://github.com/X1pe0/VMWare-CVE-CheckPOC Details
4CVE-2021-22005批量验证python脚本https://github.com/5gstudent/CVE-2021-22005-POC Details
5CVE-2021-22005_PoChttps://github.com/RedTeamExp/CVE-2021-22005_PoCPOC Details
6Nonehttps://github.com/rwincey/CVE-2021-22005POC Details
7the metasploit script(POC/EXP) about CVE-2021-22005 VMware vCenter Server contains an arbitrary file upload vulnerabilityhttps://github.com/TaroballzChen/CVE-2021-22005-metasploitPOC Details
8Nonehttps://github.com/TiagoSergio/CVE-2021-22005POC Details
9VMware vCenter Server任意文件上传漏洞 / Code By:Jun_shenghttps://github.com/Jun-5heng/CVE-2021-22005POC Details
10Nonehttps://github.com/shmilylty/cve-2021-22005-expPOC Details
11Clone from gisthttps://github.com/timb-machine-mirrors/testanull-CVE-2021-22005.pyPOC Details
12cve-2021-22005vcenter任意文件上传漏洞,可直接上传冰蝎https://github.com/InventorMAO/cve-2021-22005POC Details
13Nonehttps://github.com/tiagob0b/CVE-2021-22005POC Details
14CVE-2021-22005https://github.com/Jeromeyoung/VMWare-CVE-CheckPOC Details
15VMware vCenter Server contains an arbitrary file upload vulnerability in the Analytics service. A malicious actor with network access to port 443 on vCenter Server may exploit this issue to execute code on vCenter Server by uploading a specially crafted file.https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2021/CVE-2021-22005.yamlPOC Details
16Nonehttps://github.com/Threekiii/Awesome-POC/blob/master/%E4%BA%91%E5%AE%89%E5%85%A8%E6%BC%8F%E6%B4%9E/VMware%20vCenter%20Server%20%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E%20CVE-2021-22005.mdPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2021-22005

登录查看更多情报信息。

Same Patch Batch · n/a · 2021-09-23 · 33 CVEs total

CVE-2021-22019VMware vCenter Server 输入验证错误漏洞
CVE-2020-19951YzmCMS v5.5/controller/pay.class.php组件 跨站请求伪造漏洞
CVE-2020-19950YzmCMS 跨站脚本漏洞
CVE-2020-19949Yzmcms 跨站脚本漏洞
CVE-2020-24327Discourse 代码问题漏洞
CVE-2021-26794FrogCMS 代码问题漏洞
CVE-2021-3824Openvpn OpenVPN 跨站脚本漏洞
CVE-2021-21913D-LINK DIR-3040 信任管理问题漏洞
CVE-2021-26750Panda Security Antivirus代码问题漏洞
CVE-2021-22941Citrix Systems Citrix ShareFile 安全漏洞
CVE-2021-22948revive-adserver 安全特征问题漏洞
CVE-2021-22953Concrete CMS 跨站请求伪造漏洞
CVE-2021-22952UniFi Talk 代码注入漏洞
CVE-2021-22950Concrete CMS 跨站请求伪造漏洞
CVE-2021-22949Concrete CMS 跨站请求伪造漏洞
CVE-2021-22020VMware vCenter Server 输入验证错误漏洞
CVE-2021-22015VMware vCenter Server 安全漏洞
CVE-2021-22018VMware vCenter Server权限许可和访问控制问题漏洞
CVE-2021-22017Vmware VMware vCenter Server 授权问题漏洞
CVE-2021-22016Vmware VMware vCenter Server 跨站脚本漏洞

Showing top 20 of 33 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2021-22005

No comments yet


Leave a comment