Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-22015 PoC — VMware vCenter Server 安全漏洞

Source
Associated Vulnerability
Title:VMware vCenter Server 安全漏洞 (CVE-2021-22015)
Description:The vCenter Server contains multiple local privilege escalation vulnerabilities due to improper permissions of files and directories. An authenticated local user with non-administrative privilege may exploit these issues to elevate their privileges to root on vCenter Server Appliance.
Description
Scanner for vScalation (CVE-2021-22015) a Local Privilege Escalation in VMWare vCenter
Readme
# vScalation (CVE-2021-22015)
## Local Privilege Escalation in VMWare vCenter

-   Pentera’s research group discovered a vulnerability in VMWare’s vCenter Server program affecting VMWare’s software installed in 500,000 organizations worldwide responsible to manage their most critical systems
-   Our findings were proactively reported to VMWare and were released under CVE-2021-22015
-   Patch and additional info are available on [VMWare’s Advisory site](https://www.vmware.com/security/advisories/VMSA-2021-0020.html)

## Scanner

The scanner is designed to check whether the file in question has write access to the “cis” group, and is there any user in that group that has shell access to the host. 

For further explanation about CVE-2021-22015, please refer to our site [here](https://www.pentera.io/blog/vscalation-cve-2021-22015-local-privilege-escalation-in-vmware-vcenter)

## Prerequisites
•	Credentials for a Linux (PhotonOS) vCenter host

•	Shell access 

## Usage

1. Download the scanner to your machine
2. Execute to following commands
```
chmod 777 ./CVE-2021-22015_scanner.sh
./CVE-2021-22015_scanner.sh
```

Results:
* Vulnerability found: "Host is vulnerable to CVE-2021-22015"

![image](https://user-images.githubusercontent.com/91608347/135405852-d9395b4b-ef8f-4d66-b7a8-6f1f2b6ad3fa.png)


* Vulnerability not found: "Host isn't vulnerable to CVE-2021-22015"

## DISCLAIMER:
The code described in this advisory (the “Code”) is provided on an “as is” and “as available” basis and may contain bugs, errors, and other defects. You are advised to safeguard important data and to use caution. By using this Code, you agree that Pentera shall have no liability to you for any claims in connection with the Code. Pentera disclaims any and all warranties and any and all liability for any direct, indirect, incidental, punitive, exemplary, special or consequential damages, even if Pentera or its related parties are advised of the possibility of such damages. Pentera undertakes no duty to update the Code or this advisory.
File Snapshot

[4.0K] /data/pocs/db5c044a80d26e6f9bfecdc548a1e28289cfa250 ├── [ 511] CVE-2021-22015_scanner.sh └── [2.0K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →