CVE-2021-22013Path Traversal in Vmware Vcenter Server

CWE-22Path Traversal4 documents4 sources
Severity
7.5HIGHNVD
EPSS
0.7%
top 27.32%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 23
Latest updateMay 24

Description

The vCenter Server contains a file path traversal vulnerability leading to information disclosure in the appliance management API. A malicious actor with network access to port 443 on vCenter Server may exploit this issue to gain access to sensitive information.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:NExploitability: 3.9 | Impact: 3.6

Affected Packages3 packages

NVDvmware/vcenter_server6.7, 7.0+1
CVEListV5vmware/vmware_vcenter_serverVMware vCenter Server 6.5 before 6.5 U3q
NVDvmware/cloud_foundation3.05.0

Patches

🔴Vulnerability Details

2
GHSA
GHSA-44m9-8fq6-h94w: The vCenter Server contains a file path traversal vulnerability leading to information disclosure in the appliance management API2022-05-24
CVEList
CVE-2021-22013: The vCenter Server contains a file path traversal vulnerability leading to information disclosure in the appliance management API2021-09-23

📋Vendor Advisories

1
VMware
VMware vCenter Server updates address multiple security vulnerabilities2021-09-21
CVE-2021-22013 — Path Traversal in Vmware | cvebase