Skip to content

Latest commit

 

History

History
43 lines (37 loc) · 2.31 KB

CVE-2021-21985.md

File metadata and controls

43 lines (37 loc) · 2.31 KB

Description

The vSphere Client (HTML5) contains a remote code execution vulnerability due to lack of input validation in the Virtual SAN Health Check plug-in which is enabled by default in vCenter Server. A malicious actor with network access to port 443 may exploit this issue to execute commands with unrestricted privileges on the underlying operating system that hosts vCenter Server.

POC

Reference

Github