QID 216266

Date Published: 2021-09-22

QID 216266: VMware vCenter Server 6.7 Update 6.7 U3o (VMSA-2021-0020)

VMware vCenter Server is a server management solution that helps IT admins manage virtualized hosts and virtual machines in enterprise environments via a single console.

The vCenter Server contains an arbitrary file upload vulnerability in the Analytics service. VMware has evaluated the severity of this issue to be in the Critical severity range with a maximum CVSSv3 base score of 9.8.

Affected Versions: vCenter Server 6.7
QID Detection Logic (Unauthenticated):
This QID checks for vulnerable versions of VMware vCenter Server with build version using web service present on the target.

QID Detection Logic (Auth):
This QID checks for a workaround mentioned in Workaround Instructions for CVE-2021-22005 (85717) by sending Curl command documented in KB85717. If the output of the curl command is "HTTP/1.1 400", QID will not be flagged.

This update addresses multiple vulnerabilities as stated below:
vCenter Server file upload vulnerability (CVE-2021-22005)
vCenter Server reverse proxy bypass vulnerability (CVE-2021-22006)
vCenter Server reflected XSS vulnerability (CVE-2021-22016)
vCenter Server rhttpproxy bypass vulnerability (CVE-2021-22017)
vCenter Server local information disclosure vulnerability (CVE-2021-22007)
vCenter Server VPXD denial of service vulnerability (CVE-2021-22010)
vCenter Server Analytics service denial-of-service Vulnerability (CVE-2021-22020)
vCenter Server local privilege escalation vulnerability (CVE-2021-21991)
vCenter Server SSRF vulnerability (CVE-2021-21993)
vCenter Server XML parsing denial-of-service vulnerability (CVE-2021-21992)
vCenter Server information disclosure vulnerability (CVE-2021-22008)
vCenter Server VAPI multiple denial of service vulnerabilities (CVE-2021-22009)
vCenter server unauthenticated API endpoint vulnerability (CVE-2021-22011)
vCenter Server authenticated code execution vulnerability (CVE-2021-22014)
vCenter Server improper permission local privilege escalation vulnerabilities (CVE-2021-22015)
vCenter Server denial of service vulnerability (CVE-2021-22019)

  • CVSS V3 rated as Critical - 9.8 severity.
  • CVSS V2 rated as Critical - 9 severity.
  • Solution
    Vmware has released patch for VMware vCenter Server 6.7, visit VMware vCenter Server 6.7 Update 3o Release Notes

    Refer to VMware advisory VMSA-2021-0020 for more information.

    Workaround:
    Please refer to the KB article KB85717 for more information.

    Software Advisories
    Advisory ID Software Component Link
    VMSA-2021-0020 URL Logo www.vmware.com/security/advisories/VMSA-2021-0020.html