CVE-2021-21983

Arbitrary file write vulnerability in vRealize Operations Manager API (CVE-2021-21983) prior to 8.4 may allow an authenticated malicious actor with network access to the vRealize Operations Manager API can write files to arbitrary locations on the underlying photon operating system.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:vmware:cloud_foundation:3.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:cloud_foundation:3.0.1:*:*:*:*:*:*:*
cpe:2.3:a:vmware:cloud_foundation:3.0.1.1:*:*:*:*:*:*:*
cpe:2.3:a:vmware:cloud_foundation:3.5:*:*:*:*:*:*:*
cpe:2.3:a:vmware:cloud_foundation:3.5.1:*:*:*:*:*:*:*
cpe:2.3:a:vmware:cloud_foundation:3.7:*:*:*:*:*:*:*
cpe:2.3:a:vmware:cloud_foundation:3.7.1:*:*:*:*:*:*:*
cpe:2.3:a:vmware:cloud_foundation:3.7.2:*:*:*:*:*:*:*
cpe:2.3:a:vmware:cloud_foundation:3.8:*:*:*:*:*:*:*
cpe:2.3:a:vmware:cloud_foundation:3.8.1:*:*:*:*:*:*:*
cpe:2.3:a:vmware:cloud_foundation:3.9:*:*:*:*:*:*:*
cpe:2.3:a:vmware:cloud_foundation:3.9.1:*:*:*:*:*:*:*
cpe:2.3:a:vmware:cloud_foundation:3.10:*:*:*:*:*:*:*
cpe:2.3:a:vmware:cloud_foundation:4.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:cloud_foundation:4.0.1:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vrealize_operations_manager:7.0.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vrealize_operations_manager:7.5.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vrealize_operations_manager:8.0.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vrealize_operations_manager:8.0.1:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vrealize_operations_manager:8.1.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vrealize_operations_manager:8.1.1:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vrealize_operations_manager:8.2.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vrealize_operations_manager:8.3.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vrealize_suite_lifecycle_manager:8.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vrealize_suite_lifecycle_manager:8.0.1:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vrealize_suite_lifecycle_manager:8.1:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vrealize_suite_lifecycle_manager:8.2:*:*:*:*:*:*:*

History

21 Nov 2024, 05:49

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/162349/VMware-vRealize-Operations-Manager-Server-Side-Request-Forgery-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/162349/VMware-vRealize-Operations-Manager-Server-Side-Request-Forgery-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry
References () https://www.vmware.com/security/advisories/VMSA-2021-0004.html - Vendor Advisory () https://www.vmware.com/security/advisories/VMSA-2021-0004.html - Vendor Advisory

Information

Published : 2021-03-31 18:15

Updated : 2024-11-21 05:49


NVD link : CVE-2021-21983

Mitre link : CVE-2021-21983

CVE.ORG link : CVE-2021-21983


JSON object : View

Products Affected

vmware

  • cloud_foundation
  • vrealize_operations_manager
  • vrealize_suite_lifecycle_manager