Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).
CVE-2011-4404 — Path Traversal in Vmware Vcenter Update Manager
5 documents5 sources
Severity
5.0MEDIUMNVD
EPSS
83.3%
top 0.73%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedNov 19
Latest updateMay 17
Description
The default configuration of the HTTP server in Jetty in vSphere Update Manager in VMware vCenter Update Manager 4.0 before Update 4 and 4.1 before Update 2 allows remote attackers to conduct directory traversal attacks and read arbitrary files via unspecified vectors, a related issue to CVE-2009-1523.
CVSS vector
AV:N/AC:L/C:P/I:N/A:NExploitability: 10.0 | Impact: 2.9
Affected Packages5 packages
Patches
🔴Vulnerability Details
1GHSA▶
GHSA-2vmm-vm8r-59c6: The default configuration of the HTTP server in Jetty in vSphere Update Manager in VMware vCenter Update Manager 4↗2022-05-17
💥Exploits & PoCs
2📋Vendor Advisories
1VMware▶
VMware vCenter Update Manager fix for Jetty Web server addresses directory traversal vulnerability↗2011-11-17