The vSphere Client (HTML5) contains a remote code execution vulnerability due to lack of input validation in the Virtual SAN Health Check plug-in which is enabled by default in vCenter Server. A malicious actor with network access to port 443 may exploit this issue to execute commands with unrestricted privileges on the underlying operating system that hosts vCenter Server.
- http://packetstormsecurity.com/files/162812/VMware-Security-Advisory-2021-0010.html
- http://packetstormsecurity.com/files/163487/VMware-vCenter-Server-Virtual-SAN-Health-Check-Remote-Code-Execution.html
- https://github.com/7roublemaker/VMware-RCE-check
- https://github.com/ARPSyndicate/cvemon
- https://github.com/ARPSyndicate/kenzer-templates
- https://github.com/DaveCrown/vmware-kb82374
- https://github.com/HynekPetrak/HynekPetrak
- https://github.com/Mr-xn/Penetration_Testing_POC
- https://github.com/SexyBeast233/SecBooks
- https://github.com/Spacial/awesome-csirt
- https://github.com/aristosMiliaressis/CVE-2021-21985
- https://github.com/bigbroke/CVE-2021-21985
- https://github.com/brandonshiyay/My-Security-Learning-Resources
- https://github.com/daedalus/CVE-2021-21985
- https://github.com/fardeen-ahmed/Bug-bounty-Writeups
- https://github.com/haiclover/CVE-2021-21985
- https://github.com/joydo/CVE-Writeups
- https://github.com/lovechinacoco/https-github.com-mai-lang-chai-Middleware-Vulnerability-detection
- https://github.com/mauricelambert/CVE-2021-21985
- https://github.com/n1sh1th/CVE-POC
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/onSec-fr/CVE-2021-21985-Checker
- https://github.com/r0ckysec/CVE-2021-21985
- https://github.com/r0eXpeR/supplier
- https://github.com/sknux/CVE-2021-21985_PoC
- https://github.com/testanull/Project_CVE-2021-21985_PoC
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
- https://github.com/xnianq/cve-2021-21985_exp