Skip to main content

CVE-2021-21985

Description

The vSphere Client (HTML5) contains a remote code execution vulnerability due to lack of input validation in the Virtual SAN Health Check plug-in which is enabled by default in vCenter Server. A malicious actor with network access to port 443 may exploit this issue to execute commands with unrestricted privileges on the underlying operating system that hosts vCenter Server.

NVD
Severity: CRITICAL
CVE ID: CVE-2021-21985
CVSS Score: 9.8
CVSS Metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Refrence: NVDMITRE

Proof Of Concept

Nuclei Templates for CVE-2021-21985
bigbroke

Multiple vulnerabilities in the vSphere Client (HTML5) were privately reported to VMware. Updates and workarounds are available to address these vulnerabilities in affected VMware products.

Refrence: GitHub

alt3kx

Refrence: GitHub

onSec-fr

CVE-2021-21985 Checker.

Refrence: GitHub

mauricelambert

This script check the CVE-2021-21985 vulnerability and patch on vCenter Server.

Refrence: GitHub

xnianq

cve-2021-21985 exploit

Refrence: GitHub

daedalus

CVE-2021-21985 vmware 6.7-9.8 RCE

Refrence: GitHub

testanull

Refrence: GitHub

haidv35

Refrence: GitHub

aristosMiliaressis

cve-2021-21985 powershell poc

Refrence: GitHub

sknux

VMWARE VCENTER SERVER VIRTUAL SAN HEALTH CHECK PLUG-IN RCE (CVE-2021-21985)

Refrence: GitHub

Content on GitHub

Schira4396 | watchers:1253

VcenterKiller
一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接

Refrence: GitHub

W01fh4cker | watchers:897

VcenterKit
Vcenter综合渗透利用工具包 | Vcenter Comprehensive Penetration and Exploitation Toolkit

Refrence: GitHub