VMware vSphere 漏洞列表
共找到 10 个与 VMware vSphere 相关的漏洞
📅 加载漏洞趋势中...
-
CVE-2021-21972: VMware vSphere Client (HTML5) - Remote Code Execution POC
默认启用的 vROps 插件(com.vmware.vropspluginui.mvc)ServicesController 类的 uploadova 接口存在未授权访问,可利用路径穿越将文件解压至特定目录实现 getshell。 FOFA: app="vmware-vCenter" -
CVE-2021-21985: VMware vSphere Client (HTML5) - Remote Code Execution POC
The vSphere Client (HTML5) contains a remote code execution vulnerability due to lack of input validation in the Virtual SAN Health Check plug-in which is enabled by default in vCenter Server. A malicious actor with network access to port 443 may exploit this issue to execute commands with unrestricted privileges on the underlying operating system that hosts vCenter Server. -
CVE-2021-21972: VMware vSphere Client (HTML5) - Remote Code Execution POC
VMware vCenter vSphere Client (HTML5) contains a remote code execution vulnerability in a vCenter Server plugin. A malicious actor with network access to port 443 may exploit this issue to execute commands with unrestricted privileges on the underlying operating system that hosts vCenter Server. This affects VMware vCenter Server (7.x before 7.0 U1c, 6.7 before 6.7 U3l and 6.5 before 6.5 U3n) and VMware Cloud Foundation (4.x before 4.2 and 3.x before 3.10.1.2). -
CVE-2021-21973: VMware vSphere - Server-Side Request Forgery POC
VMware vSphere (HTML5) is susceptible to server-side request forgery due to improper validation of URLs in a vCenter Server plugin. An attacker with network access to port 443 can exploit this issue by sending a POST request to the plugin. This affects VMware vCenter Server (7.x before 7.0 U1c, 6.7 before 6.7 U3l, and 6.5 before 6.5 U3n) and VMware Cloud Foundation (4.x before 4.2 and 3.x before 3.10.1.2). -
CVE-2021-21985: VMware vSphere Client (HTML5) - Remote Code Execution POC
The vSphere Client (HTML5) contains a remote code execution vulnerability due to lack of input validation in the Virtual SAN Health Check plug-in which is enabled by default in vCenter Server. A malicious actor with network access to port 443 may exploit this issue to execute commands with unrestricted privileges on the underlying operating system that hosts vCenter Server. -
CVE-2021-21972: VMware vSphere Client (HTML5) - Remote Code Execution POC
VMware vCenter vSphere Client (HTML5) contains a remote code execution vulnerability in a vCenter Server plugin. A malicious actor with network access to port 443 may exploit this issue to execute commands with unrestricted privileges on the underlying operating system that hosts vCenter Server. This affects VMware vCenter Server (7.x before 7.0 U1c, 6.7 before 6.7 U3l and 6.5 before 6.5 U3n) and VMware Cloud Foundation (4.x before 4.2 and 3.x before 3.10.1.2). -
CVE-2021-21973: VMware vSphere - Server-Side Request Forgery POC
VMware vSphere (HTML5) is susceptible to server-side request forgery due to improper validation of URLs in a vCenter Server plugin. An attacker with network access to port 443 can exploit this issue by sending a POST request to the plugin. This affects VMware vCenter Server (7.x before 7.0 U1c, 6.7 before 6.7 U3l, and 6.5 before 6.5 U3n) and VMware Cloud Foundation (4.x before 4.2 and 3.x before 3.10.1.2). -
CVE-2021-21985: VMware vSphere Client (HTML5) - Remote Code Execution POC
The vSphere Client (HTML5) contains a remote code execution vulnerability due to lack of input validation in the Virtual SAN Health Check plug-in which is enabled by default in vCenter Server. A malicious actor with network access to port 443 may exploit this issue to execute commands with unrestricted privileges on the underlying operating system that hosts vCenter Server. -
Vmware vSphere 基于log4J组件的远程命令执行漏洞 无POC
Vmware vSphere 基于log4J组件的远程命令执行漏洞,攻击者可利用该组件漏洞远程执行命令 -
VMware vSphere Data Protection 存在任意文件上传漏洞 无POC
EMC Avamar Server、EMC NetWorker Virtual Edition(NVE)和EMC Integrated Data Protection Appliance都是美国易安信(EMC)公司的产品。EMC Avamar Server是一套用于服务器的完全虚拟化的备份和恢复软件。NetWorker Virtual Edition(NVE)是一套统一备份和恢复软件的虚拟版。Integrated Data Protection Appliance是一套基于磁盘的备份和恢复解决方案。 多款EMC产品中存在任意文件上传漏洞。远程攻击者可利用该漏洞向服务器文件系统上的任意位置上传任意恶意的文件。以下产品和版本受到影响:EMC Avamar Server 7.1.x版本,7.2.x版本,7.3.x版本,7.4.x版本,7.5.0版本;EMC NetWorker Virtual Edition (NVE) 9.0.x版本,9.1.x版本,9.2.x版本;EMC Integrated Data Protection Appliance 2.0版本。