VMware View Planner 4.x prior to 4.6 Security Patch 1 contains a remote code execution vulnerability. Improper input validation and lack of authorization leading to arbitrary file upload in logupload web application. An unauthorized attacker with network access to View Planner Harness could upload and execute a specially crafted file leading to remote code execution within the logupload container.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/161879/VMware-View-Planner-4.6-Remote-Code-Execution.html | Exploit Third Party Advisory VDB Entry |
https://www.vmware.com/security/advisories/VMSA-2021-0003.html | Vendor Advisory |
http://packetstormsecurity.com/files/161879/VMware-View-Planner-4.6-Remote-Code-Execution.html | Exploit Third Party Advisory VDB Entry |
https://www.vmware.com/security/advisories/VMSA-2021-0003.html | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 05:49
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/161879/VMware-View-Planner-4.6-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry | |
References | () https://www.vmware.com/security/advisories/VMSA-2021-0003.html - Vendor Advisory |
08 Aug 2023, 14:21
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-20 CWE-862 |
Information
Published : 2021-03-03 18:15
Updated : 2024-11-21 05:49
NVD link : CVE-2021-21978
Mitre link : CVE-2021-21978
CVE.ORG link : CVE-2021-21978
JSON object : View
Products Affected
vmware
- view_planner