⚠ Actively exploited
Added to CISA KEV on 2022-03-07. Federal agencies required to patch by 2022-03-21. Required action: Apply updates per vendor instructions..
CVE-2021-21973 — Server-Side Request Forgery in Vmware Cloud Foundation
Severity
5.3MEDIUMNVD
EPSS
90.3%
top 0.40%
CISA KEV
KEV
Added 2022-03-07
Due 2022-03-21
Exploit
Exploited in wild
Active exploitation observed
Timeline
PublishedFeb 24
KEV addedMar 7
KEV dueMar 21
Latest updateMay 24
CISA Required Action: Apply updates per vendor instructions.
Description
The vSphere Client (HTML5) contains an SSRF (Server Side Request Forgery) vulnerability due to improper validation of URLs in a vCenter Server plugin. A malicious actor with network access to port 443 may exploit this issue by sending a POST request to vCenter Server plugin leading to information disclosure. This affects: VMware vCenter Server (7.x before 7.0 U1c, 6.7 before 6.7 U3l and 6.5 before 6.5 U3n) and VMware Cloud Foundation (4.x before 4.2 and 3.x before 3.10.1.2).
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:NExploitability: 3.9 | Impact: 1.4
Affected Packages4 packages
🔴Vulnerability Details
3GHSA▶
GHSA-5j6h-79mj-qfq2: The vSphere Client (HTML5) contains an SSRF (Server Side Request Forgery) vulnerability due to improper validation of URLs in a vCenter Server plugin↗2022-05-24
CVEList▶
CVE-2021-21973: The vSphere Client (HTML5) contains an SSRF (Server Side Request Forgery) vulnerability due to improper validation of URLs in a vCenter Server plugin↗2021-02-24
VulnCheck
▶
💥Exploits & PoCs
1Nuclei▶
VMware vSphere - Server-Side Request Forgery