Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-22017

KEV EPSS 74.83% · P99
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2021-22017

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Rhttproxy as used in vCenter Server contains a vulnerability due to improper implementation of URI normalization. A malicious actor with network access to port 443 on vCenter Server may exploit this issue to bypass proxy leading to internal endpoints being accessed.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Vmware VMware vCenter Server 授权问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Vmware VMware vCenter Server是美国威睿(Vmware)公司的一套服务器和虚拟化管理软件。该软件提供了一个用于管理VMware vSphere环境的集中式平台,可自动实施和交付虚拟基础架构。 VMware vCenter Server 存在授权问题漏洞,该漏洞源于对URL规范化存在缺陷。远程攻击者可利用该漏洞发送一个特制的URL,绕过认证并访问内部端点。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
-VMware vCenter Server, VMware Cloud Foundation VMware vCenter Server(6.7 before 6.7 U3o and 6.5 before 6.5 U3q) and VMware Cloud Foundation 3.x before 3.10.2.2 -

II. Public POCs for CVE-2021-22017

#POC DescriptionSource LinkShenlong Link
1Rhttproxy as used in vCenter Server contains a vulnerability due to improper implementation of URI normalization. A malicious actor with network access to port 443 on vCenter Server may exploit this issue to bypass proxy leading to internal endpoints being accessed. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2021/CVE-2021-22017.yamlPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2021-22017

Please Login to view more intelligence information

Same Patch Batch · n/a · 2021-09-23 · 33 CVEs total

CVE-2021-22019VMware vCenter Server 输入验证错误漏洞
CVE-2020-19951YzmCMS v5.5/controller/pay.class.php组件 跨站请求伪造漏洞
CVE-2020-19950YzmCMS 跨站脚本漏洞
CVE-2020-19949Yzmcms 跨站脚本漏洞
CVE-2020-24327Discourse 代码问题漏洞
CVE-2021-26794FrogCMS 代码问题漏洞
CVE-2021-3824Openvpn OpenVPN 跨站脚本漏洞
CVE-2021-21913D-LINK DIR-3040 信任管理问题漏洞
CVE-2021-26750Panda Security Antivirus代码问题漏洞
CVE-2021-22941Citrix Systems Citrix ShareFile 安全漏洞
CVE-2021-22948revive-adserver 安全特征问题漏洞
CVE-2021-22953Concrete CMS 跨站请求伪造漏洞
CVE-2021-22952UniFi Talk 代码注入漏洞
CVE-2021-22950Concrete CMS 跨站请求伪造漏洞
CVE-2021-22949Concrete CMS 跨站请求伪造漏洞
CVE-2021-22020VMware vCenter Server 输入验证错误漏洞
CVE-2021-22015VMware vCenter Server 安全漏洞
CVE-2021-22018VMware vCenter Server权限许可和访问控制问题漏洞
CVE-2021-22016Vmware VMware vCenter Server 跨站脚本漏洞
CVE-2021-22014VMware vCenter Server 代码注入漏洞

Showing top 20 of 33 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2021-22017

No comments yet


Leave a comment