CVE-2021-21972

The vSphere Client (HTML5) contains a remote code execution vulnerability in a vCenter Server plugin. A malicious actor with network access to port 443 may exploit this issue to execute commands with unrestricted privileges on the underlying operating system that hosts vCenter Server. This affects VMware vCenter Server (7.x before 7.0 U1c, 6.7 before 6.7 U3l and 6.5 before 6.5 U3n) and VMware Cloud Foundation (4.x before 4.2 and 3.x before 3.10.1.2).
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*
cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:-:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:a:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:b:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:c:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:d:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:e:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:f:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:update1d:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:update1e:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:update1g:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:update2:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:update2b:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:update2c:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:update2d:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:update2g:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:update3:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:update3d:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:update3f:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:update3k:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:-:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:a:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:b:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:d:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:update1:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:update1b:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:update2:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:update2a:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:update2c:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:update3:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:update3a:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:update3b:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:update3f:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:update3g:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:update3j:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:7.0:-:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:7.0:a:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:7.0:b:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:7.0:c:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:7.0:d:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:7.0:update1:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:7.0:update1a:*:*:*:*:*:*

History

13 Feb 2024, 16:44

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/161590/VMware-vCenter-Server-7.0-Arbitrary-File-Upload.html - Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/161590/VMware-vCenter-Server-7.0-Arbitrary-File-Upload.html - Exploit, Third Party Advisory, VDB Entry

08 Aug 2023, 14:21

Type Values Removed Values Added
CWE CWE-306

12 Jul 2022, 17:42

Type Values Removed Values Added
CWE CWE-269 CWE-306
CWE-22

07 Sep 2021, 22:07

Type Values Removed Values Added
References (MISC) http://packetstormsecurity.com/files/163268/VMware-vCenter-6.5-6.7-7.0-Remote-Code-Execution.html - (MISC) http://packetstormsecurity.com/files/163268/VMware-vCenter-6.5-6.7-7.0-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry

24 Aug 2021, 10:59

Type Values Removed Values Added
CPE cpe:2.3:a:vmware:vcenter_server:6.5:u3d:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:u3g:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:u2:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:u1d:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:u2g:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:u1b:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:u2:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:u2a:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:7.0:u1a:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:u3b:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:u2c:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:u2c:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:7.0:u1:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:u1g:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:u2b:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:u3:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:u1:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:u1e:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:u3f:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:u3a:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:u3:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:u3j:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:u3k:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:u3f:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:u2d:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:update3f:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:update3j:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:update3a:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:update2g:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:update1d:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:update2:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:7.0:update1:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:update2a:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:update3d:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:update1e:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:update1g:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:update3:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:update2c:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:update2c:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:update3b:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:update3k:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:update2b:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:update2d:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:update3g:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:7.0:update1a:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:update1b:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:update1:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:update2:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:update3f:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:update3:*:*:*:*:*:*
References
  • (MISC) http://packetstormsecurity.com/files/163268/VMware-vCenter-6.5-6.7-7.0-Remote-Code-Execution.html -

Information

Published : 2021-02-24 17:15

Updated : 2024-02-13 16:44


NVD link : CVE-2021-21972

Mitre link : CVE-2021-21972

CVE.ORG link : CVE-2021-21972


JSON object : View

Products Affected

vmware

  • vcenter_server
  • cloud_foundation
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')