QID 730102
Date Published: 2021-06-03
QID 730102: VMware vCenter Server Remote Code Execution (RCE) Vulnerability (VMSA-2021-0010) (UNAUTHENTICATED))
VMware vCenter is the centralized management tool for the vSphere suite.
The vSphere Client (HTML5) contains a remote code execution vulnerability due to lack of input validation in the Virtual SAN Health Check plug-in which is enabled by default in vCenter Server. (CVE-2021-21985)
Affected Versions:
VMware vCenter Server 7.0 prior to build 17958471
VMware vCenter Server 6.7 prior to build 18010531
VMware vCenter Server 6.5 prior to build 17994927
QID Detection Logic (Unauthenticated):
The QID sends a POST request to " /ui/h5-vsan/rest/proxy/service/com.vmware.vsan.client.services.capability.VsanCapabilityProvider/getHostCapabilityData" to detect if the target is vulnerable or not.
Note: If the workaround mentioned by the vendor is applied, QID will not flag.
Successful exploitation of the vulnerability will allow remote code execution.
Refer to VMware advisory VMSA-2021-0010 for more information.
Workaround:
Affected Plugins must be set to "incompatible." Disabling a plugin from within the UI does not prevent exploitation. Please refer to KB article KB83829 for more information.
- VMSA-2021-0010 -
www.vmware.com/security/advisories/VMSA-2021-0010.html
CVEs related to QID 730102
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| VMSA-2021-0010 |
|