VMware vCenter Server SSRF (CVE-2021-21973) (Direct Check)

medium Nessus Plugin ID 164351

Synopsis

The version of VMware vCenter vSphere running on the remote server is affected by a server-side request forgery vulnerability.

Description

A server-side request forgery vulnerability exists in the VMware vCenter vSphere HTML5 client due to improper validation of URLs in a vCenter Server plugin. An unauthenticated, remote attacker can exploit this, via HTTPS, leading to information disclosure.

Solution

Apply the appropriate patch as referenced in the vendor advisory.

See Also

https://www.vmware.com/security/advisories/VMSA-2021-0002.html

Plugin Details

Severity: Medium

ID: 164351

File Name: vmware_vcenter_cve-2021-21973.nbin

Version: 1.30

Type: remote

Family: Misc.

Published: 8/23/2022

Updated: 4/23/2024

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 2.9

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 4.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS Score Source: CVE-2021-21973

CVSS v3

Risk Factor: Medium

Base Score: 5.3

Temporal Score: 5.1

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:vmware:vcenter_server

Required KB Items: Host/VMware/vCenter

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2/23/2021

Vulnerability Publication Date: 2/23/2021

CISA Known Exploited Vulnerability Due Dates: 3/21/2022

Reference Information

CVE: CVE-2021-21973

IAVA: 2021-A-0109