The vSphere Client (HTML5) contains a remote code execution vulnerability in a vCenter Server plugin. A malicious actor with network access to port 443 may exploit this issue to execute commands with unrestricted privileges on the underlying operating system that hosts vCenter Server. This affects VMware vCenter Server (7.x before 7.0 U1c, 6.7 before 6.7 U3l and 6.5 before 6.5 U3n) and VMware Cloud Foundation (4.x before 4.2 and 3.x before 3.10.1.2).
CVE Infomation | Exploits or more Infomation |
---|---|
mitre | EXPLOIT DATABASE |
NVD | 0day.today |
vulmon.com | github |
CVE Details | |
JVN ENG JPN | |
Reconshell |
Software Tag: Linux(1 tweets) VMware(4 tweets) vSphere(1 tweets)
List of frequently cited URLs
User | URL | Info Source | Date |
---|---|---|---|
ipssignatures | https://twitter.com/mertcangokgoz/status/1621613393084928001 | Source ipssignatures 1621782107021271045 | 2023/02/04 |
kalinga | https://www.vmware.com/security/advisories/VMSA-2021-0002.html | Source kalinga 1622209899295019008 | 2023/02/05 |
GeorgeWest3112 | https://www.vmware.com/security/advisories/VMSA-2021-0002.html | Source GeorgeWest3112 1622950364113694721 | 2023/02/07 |
an0ngh05t | https://twitter.com/an0ngh05t/status/1624594465829650434/vi... | Source an0ngh05t 1624594465829650434 | 2023/02/12 |
edxpmen99 | https://lnkd.in/erT29ipJ | Source edxpmen99 1628379805937704961 | 2023/02/22 |
dark_sky_intel | https://github.com/NS-Sp4ce/CVE-2021-21972/blob/main/payloa... | Source dark_sky_intel 1628923795342860290 | 2023/02/24 |
an0ngh05t | None | Source an0ngh05t 1632781788756967430 | 2023/03/07 |
List of frequently cited URLs
User | URL | Info Source |
---|---|---|
ipssignatures | twitter.com | Show Tweet |
kalinga | vmware.com | Show Tweet |
GeorgeWest3112 | vmware.com | Show Tweet |
an0ngh05t | twitter.com | Show Tweet |
edxpmen99 | lnkd.in | Show Tweet |
dark_sky_intel | github.com | Show Tweet |
an0ngh05t | Show Tweet |
Name | URL |
---|---|
NS-Sp4ce/CVE-2021-21972 | https://github.com/NS-Sp4ce/CVE-2021-21972 |
horizon3ai/CVE-2021-21972 | https://github.com/horizon3ai/CVE-2021-21972 |
QmF0c3UK/CVE-2021-21972-vCenter-6.5-7.0-RCE-POC | https://github.com/QmF0c3UK/CVE-2021-21972-vCenter-6.5-7.0-RCE-POC |
alt3kx/CVE-2021-21972 | https://github.com/alt3kx/CVE-2021-21972 |
psc4re/NSE-scripts | https://github.com/psc4re/NSE-scripts |
milo2012/CVE-2021-21972 | https://github.com/milo2012/CVE-2021-21972 |
conjojo/VMware_vCenter_UNAuthorized_RCE_CVE-2021-21972 | https://github.com/conjojo/VMware_vCenter_UNAuthorized_RCE_CVE-2021-21972 |
GuayoyoLabs/CVE-2021-21972 | https://github.com/GuayoyoLabs/CVE-2021-21972 |
yaunsky/CVE-2021-21972 | https://github.com/yaunsky/CVE-2021-21972 |
B1anda0/CVE-2021-21972 | https://github.com/B1anda0/CVE-2021-21972 |
Name | URL |
---|---|
NS-Sp4ce/CVE-2021-21972 | github.com |
horizon3ai/CVE-2021-21972 | github.com |
QmF0c3UK/CVE-2021-21972-vCenter-6.5-7.0-RCE-POC | github.com |
alt3kx/CVE-2021-21972 | github.com |
psc4re/NSE-scripts | github.com |
milo2012/CVE-2021-21972 | github.com |
conjojo/VMware_vCenter_UNAuthorized_RCE_CVE-2021-21972 | github.com |
GuayoyoLabs/CVE-2021-21972 | github.com |
yaunsky/CVE-2021-21972 | github.com |
B1anda0/CVE-2021-21972 | github.com |