CVE-2021-21985
Description
The vSphere Client (HTML5) contains a remote code execution vulnerability due to lack of input validation in the Virtual SAN Health Check plug-in which is enabled by default in vCenter Server. A malicious actor with network access to port 443 may exploit this issue to execute commands with unrestricted privileges on the underlying operating system that hosts vCenter Server.
Severity: CRITICAL
CVE ID: CVE-2021-21985
CVSS Score: 9.8
CVSS Metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Proof Of Concept
Nuclei Templates for CVE-2021-21985
Refrence: Project Discovery GitHub
bigbroke
Multiple vulnerabilities in the vSphere Client (HTML5) were privately reported to VMware. Updates and workarounds are available to address these vulnerabilities in affected VMware products.
Refrence: GitHub
alt3kx
Refrence: GitHub
onSec-fr
CVE-2021-21985 Checker.
Refrence: GitHub
mauricelambert
This script check the CVE-2021-21985 vulnerability and patch on vCenter Server.
Refrence: GitHub
xnianq
cve-2021-21985 exploit
Refrence: GitHub
daedalus
CVE-2021-21985 vmware 6.7-9.8 RCE
Refrence: GitHub
testanull
Refrence: GitHub
haidv35
Refrence: GitHub
aristosMiliaressis
cve-2021-21985 powershell poc
Refrence: GitHub
sknux
VMWARE VCENTER SERVER VIRTUAL SAN HEALTH CHECK PLUG-IN RCE (CVE-2021-21985)
Refrence: GitHub
Content on GitHub
Schira4396 | watchers:1253
VcenterKiller
一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接
Refrence: GitHub
W01fh4cker | watchers:897
VcenterKit
Vcenter综合渗透利用工具包 | Vcenter Comprehensive Penetration and Exploitation Toolkit
Refrence: GitHub