QID 216253
Date Published: 2022-02-11
QID 216253: VMware vCenter Server 7.0 Update 7.0 U1c Missing (VMSA-2021-0002)
VMware vCenter is the centralized management tool for the vSphere suite.
The vSphere Client (HTML5) contains a remote code execution vulnerability in a vCenter Server plugin. VMware has evaluated the severity of this issue to be in the Critical severity range with a maximum CVSSv3 base score of 9.8..
The vSphere Client (HTML5) contains an SSRF (Server Side Request Forgery) vulnerability due to improper validation of URLs in a vCenter Server plugin. VMware has evaluated the severity of this issue to be in the Moderate severity range with a maximum CVSSv3 base score of 5.3.
Affected Versions:
VMware vCenter Server 7.0 prior to build 17327586
QID Detection Logic (Unauthenticated):
This QID checks for vulnerable versions of VMware vCenter Server with build version using web service present on target.
A malicious actor with network access to port 443 may exploit this issue to execute commands with unrestricted privileges on the underlying operating system that hosts vCenter Server.
Refer to VMware advisory VMSA-2021-0002 for more information.
Workaround:
Please refer to the article on details to apply the workaround VMware vCenter Server (82374)
- VMSA-2021-0002 -
www.vmware.com/security/advisories/VMSA-2021-0002.html
CVEs related to QID 216253
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| VMSA-2021-0002 |
|