Arbitrary file write vulnerability in vRealize Operations Manager API (CVE-2021-21983) prior to 8.4 may allow an authenticated malicious actor with network access to the vRealize Operations Manager API can write files to arbitrary locations on the underlying photon operating system.
Published 2021-03-31 18:15:15
Updated 2022-02-01 17:45:44
Source VMware
View at NVD,   CVE.org

Exploit prediction scoring system (EPSS) score for CVE-2021-21983

0.18%
Probability of exploitation activity in the next 30 days EPSS Score History
~ 56 %
Percentile, the proportion of vulnerabilities that are scored at or less

Metasploit modules for CVE-2021-21983

  • VMware vRealize Operations (vROps) Manager SSRF RCE
    Disclosure Date: 2021-03-30
    First seen: 2021-04-27
    exploit/linux/http/vmware_vrops_mgr_ssrf_rce
    This module exploits a pre-auth SSRF (CVE-2021-21975) and post-auth file write (CVE-2021-21983) in VMware vRealize Operations Manager to leak admin creds and write/execute a JSP payload. CVE-2021-21975 affects the /casa/nodes/thumbprints endpoint, and

CVSS scores for CVE-2021-21983

Base Score Base Severity CVSS Vector Exploitability Score Impact Score Score Source First Seen
8.5
HIGH AV:N/AC:L/Au:S/C:N/I:C/A:C
8.0
9.2
NIST
6.5
MEDIUM CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
1.2
5.2
NIST

References for CVE-2021-21983

Products affected by CVE-2021-21983

This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!