CVE-2021-21972

The vSphere Client (HTML5) contains a remote code execution vulnerability in a vCenter Server plugin. A malicious actor with network access to port 443 may exploit this issue to execute commands with unrestricted privileges on the underlying operating system that hosts vCenter Server. This affects VMware vCenter Server (7.x before 7.0 U1c, 6.7 before 6.7 U3l and 6.5 before 6.5 U3n) and VMware Cloud Foundation (4.x before 4.2 and 3.x before 3.10.1.2).
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*
cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:-:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:a:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:b:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:c:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:d:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:e:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:f:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:update1d:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:update1e:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:update1g:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:update2:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:update2b:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:update2c:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:update2d:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:update2g:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:update3:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:update3d:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:update3f:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:update3k:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:-:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:a:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:b:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:d:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:update1:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:update1b:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:update2:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:update2a:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:update2c:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:update3:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:update3a:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:update3b:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:update3f:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:update3g:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:update3j:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:7.0:-:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:7.0:a:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:7.0:b:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:7.0:c:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:7.0:d:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:7.0:update1:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:7.0:update1a:*:*:*:*:*:*

History

13 Feb 2024, 16:44

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/161590/VMware-vCenter-Server-7.0-Arbitrary-File-Upload.html - Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/161590/VMware-vCenter-Server-7.0-Arbitrary-File-Upload.html - Exploit, Third Party Advisory, VDB Entry

08 Aug 2023, 14:21

Type Values Removed Values Added
CWE CWE-306

12 Jul 2022, 17:42

Type Values Removed Values Added
CWE CWE-269 CWE-22
CWE-306

07 Sep 2021, 22:07

Type Values Removed Values Added
References (MISC) http://packetstormsecurity.com/files/163268/VMware-vCenter-6.5-6.7-7.0-Remote-Code-Execution.html - (MISC) http://packetstormsecurity.com/files/163268/VMware-vCenter-6.5-6.7-7.0-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry

24 Aug 2021, 10:59

Type Values Removed Values Added
CPE cpe:2.3:a:vmware:vcenter_server:6.7:u2:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:u1b:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:u3:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:u1d:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:u3:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:u3j:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:u3f:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:u1g:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:u2g:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:u3g:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:u3a:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:u2d:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:u3f:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:u2:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:u3b:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:u3k:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:u2b:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:u1e:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:7.0:u1a:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:u2c:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:u2a:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:u2c:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:u1:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:u3d:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:7.0:u1:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:update2c:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:update2g:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:update3d:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:update2:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:update3b:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:7.0:update1a:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:update1e:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:update1d:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:update2c:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:update3f:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:update3g:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:7.0:update1:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:update1:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:update3:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:update3j:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:update1b:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:update1g:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:update2:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:update3:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:update2a:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:update3f:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:update2b:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:update3k:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:update2d:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:update3a:*:*:*:*:*:*
References
  • (MISC) http://packetstormsecurity.com/files/163268/VMware-vCenter-6.5-6.7-7.0-Remote-Code-Execution.html -

25 Mar 2021, 18:49

Type Values Removed Values Added
References (MISC) http://packetstormsecurity.com/files/161590/VMware-vCenter-Server-7.0-Arbitrary-File-Upload.html - Third Party Advisory (MISC) http://packetstormsecurity.com/files/161590/VMware-vCenter-Server-7.0-Arbitrary-File-Upload.html - Third Party Advisory, VDB Entry
References (MISC) http://packetstormsecurity.com/files/161695/VMware-vCenter-Server-File-Upload-Remote-Code-Execution.html - (MISC) http://packetstormsecurity.com/files/161695/VMware-vCenter-Server-File-Upload-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry

08 Mar 2021, 19:15

Type Values Removed Values Added
References
  • (MISC) http://packetstormsecurity.com/files/161695/VMware-vCenter-Server-File-Upload-Remote-Code-Execution.html -

04 Mar 2021, 20:52

Type Values Removed Values Added
References (MISC) http://packetstormsecurity.com/files/161590/VMware-vCenter-Server-7.0-Arbitrary-File-Upload.html - (MISC) http://packetstormsecurity.com/files/161590/VMware-vCenter-Server-7.0-Arbitrary-File-Upload.html - Third Party Advisory
References (CONFIRM) https://www.vmware.com/security/advisories/VMSA-2021-0002.html - (CONFIRM) https://www.vmware.com/security/advisories/VMSA-2021-0002.html - Vendor Advisory
CVSS v2 : unknown
v3 : unknown
v2 : 10.0
v3 : 9.8
CPE cpe:2.3:a:vmware:vcenter_server:6.5:b:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:7.0:c:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:u1d:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:a:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:u1g:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:u2:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:f:*:*:*:*:*:*
cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:-:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:u3d:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:u2a:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:a:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:7.0:u1:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:u3a:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:u1:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:c:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:u3k:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:b:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:u2b:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:u3:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:u1e:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:u3b:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:u2c:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:u3:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:u2g:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:u3f:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:7.0:u1a:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:u2c:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:-:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:u1b:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:u3g:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:7.0:a:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:7.0:b:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:e:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:d:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:d:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:u2:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:7.0:d:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:u2d:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:u3f:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:u3j:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:7.0:-:*:*:*:*:*:*
CWE CWE-269

01 Mar 2021, 18:15

Type Values Removed Values Added
References
  • (MISC) http://packetstormsecurity.com/files/161590/VMware-vCenter-Server-7.0-Arbitrary-File-Upload.html -

24 Feb 2021, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2021-02-24 17:15

Updated : 2024-02-13 16:44


NVD link : CVE-2021-21972

Mitre link : CVE-2021-21972

CVE.ORG link : CVE-2021-21972


JSON object : View

Products Affected

vmware

  • vcenter_server
  • cloud_foundation
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')