nomisec
WORKING POC
1,464 stars
by Schira4396 · remote
https://github.com/Schira4396/VcenterKiller
This repository contains a Go-based exploit tool for multiple VMware vCenter vulnerabilities, including CVE-2022-22954 (RCE), CVE-2021-21972, CVE-2021-21985, CVE-2021-22005, and Log4j (CVE-2021-44228). It supports command execution, file upload, reverse shells, and SSH key deployment.
Classification
Working Poc 95%
Attack Type
Rce | Auth Bypass
Target:
VMware vCenter (multiple versions)
No auth needed
Prerequisites:
Network access to target vCenter instance · Vulnerable vCenter version
nomisec
WORKING POC
500 stars
by NS-Sp4ce · remote
https://github.com/NS-Sp4ce/CVE-2021-21972
This repository contains a functional exploit for CVE-2021-21972, a directory traversal vulnerability in VMware vCenter Server. The exploit uploads a malicious JSP file to achieve remote code execution (RCE) by leveraging the vulnerable `/ui/vropspluginui/rest/services/uploadova` endpoint.
Classification
Working Poc 95%
Target:
VMware vCenter Server (versions 6.7 and 7.0)
No auth needed
Prerequisites:
Network access to the vulnerable vCenter Server · The target must be running an affected version of VMware vCenter Server
nomisec
WORKING POC
270 stars
by horizon3ai · remote
https://github.com/horizon3ai/CVE-2021-21972
This repository contains a functional exploit for CVE-2021-21972, a directory traversal vulnerability in VMware vCenter Server. The exploit allows unauthenticated file upload via a crafted tar archive, leading to remote code execution on both Windows and Unix targets.
Classification
Working Poc 100%
Target:
VMware vCenter Server (VCSA) 6.5, 7.0
No auth needed
Prerequisites:
Network access to the vCenter Server · Knowledge of target OS (Windows/Unix) for path traversal
nomisec
SCANNER
163 stars
by psc4re · poc
https://github.com/psc4re/NSE-scripts
This repository contains NSE scripts for detecting vulnerabilities, including CVE-2020-1350 (SIGRed) and CVE-2020-0796 (SMBGhost). The scripts are designed for safe detection and do not include exploit payloads.
Classification
Scanner 90%
Target:
Microsoft DNS Server (CVE-2020-1350), Microsoft SMBv3 (CVE-2020-0796)
No auth needed
Prerequisites:
Nmap with NSE support · Network access to target
nomisec
SCANNER
137 stars
by QmF0c3UK · remote
https://github.com/QmF0c3UK/CVE-2021-21972-vCenter-6.5-7.0-RCE-POC
The repository contains a Python script that checks for the presence of CVE-2021-21972 by sending a crafted request to the target URL and verifying the response. It does not include an exploit module for achieving RCE, as stated in the README.
Classification
Scanner 90%
Target:
VMware vCenter Server 6.5-7.0
No auth needed
Prerequisites:
Network access to the target vCenter Server · A crafted TAR file named 'test.tar'
nomisec
SCANNER
54 stars
by alt3kx · infoleak
https://github.com/alt3kx/CVE-2021-21972
This repository provides a detection script for CVE-2021-21972, a remote code execution vulnerability in VMware vCenter Server. It checks for the presence of the vulnerable endpoint '/ui/vropspluginui/rest/services/uploadova' and verifies the response for indicators of vulnerability.
Classification
Scanner 90%
Target:
VMware vCenter Server 6.5-7.0
No auth needed
Prerequisites:
Network access to port 443 on the target vCenter Server
nomisec
WORKING POC
33 stars
by milo2012 · remote
https://github.com/milo2012/CVE-2021-21972
This repository contains a functional exploit for CVE-2021-21972, a remote code execution vulnerability in VMware vCenter Server. The exploit leverages a directory traversal flaw in the vSphere Client (HTML5) plugin to upload a malicious tar file, enabling SSH key injection for unauthorized access.
Classification
Working Poc 95%
Target:
VMware vCenter Server (7.x before 7.0 U1c, 6.7 before 6.7 U3l, 6.5 before 6.5 U3n)
No auth needed
Prerequisites:
Network access to port 443 on the target vCenter Server
nomisec
SCANNER
28 stars
by conjojo · remote
https://github.com/conjojo/VMware_vCenter_UNAuthorized_RCE_CVE-2021-21972
The repository contains a PoC script written in Python using the pocsuite3 framework to detect the VMware vCenter unauthorized RCE vulnerability (CVE-2021-21972). The script checks for the presence of the vulnerability by sending HTTP requests to specific endpoints and verifying the response, but it does not include exploit code to achieve RCE.
Classification
Scanner 90%
Target:
VMware vCenter (versions before 7.0 U1c, 6.7 U3l, and 6.5 U3n)
No auth needed
Prerequisites:
Network access to the target VMware vCenter instance
nomisec
SCANNER
28 stars
by GuayoyoCyber · infoleak
https://github.com/GuayoyoCyber/CVE-2021-21972
This repository contains an Nmap script designed to detect the presence of CVE-2021-21972, a remote code execution vulnerability in VMware vCenter Server. The script scans for the vulnerability but does not include exploit code for actual exploitation.
Classification
Scanner 90%
Target:
VMware vCenter Server
No auth needed
Prerequisites:
Network access to the target vCenter Server on port 443
nomisec
WORKING POC
20 stars
by TaroballzChen · remote
https://github.com/TaroballzChen/CVE-2021-21972
This repository contains a functional Metasploit exploit for CVE-2021-21972, an unauthenticated file upload vulnerability in VMware vCenter Server. The exploit allows remote code execution by uploading a malicious JSP file or SSH key via a crafted tar archive.
Classification
Working Poc 95%
Target:
VMware vCenter Server (versions 6.5, 6.7, 7.0)
No auth needed
Prerequisites:
Network access to the vCenter Server · A JSP webshell or SSH public key file
nomisec
WORKING POC
13 stars
by Ma1Dong · remote
https://github.com/Ma1Dong/vcenter_rce
This repository contains a functional exploit for CVE-2021-21972, a file upload vulnerability in VMware vCenter 6.5-7.0. The exploit uploads a malicious JSP file (Behinder payload) to achieve remote code execution.
Classification
Working Poc 95%
Target:
VMware vCenter 6.5-7.0
No auth needed
Prerequisites:
Network access to the vCenter server · vCenter server with vulnerable version (6.5-7.0)
nomisec
SCANNER
11 stars
by B1anda0 · infoleak
https://github.com/B1anda0/CVE-2021-21972
The repository contains a Python script that scans for CVE-2021-21972, a VMware vCenter Server RCE vulnerability, by checking specific endpoints for characteristic responses. It does not include exploit code but verifies vulnerability presence.
Classification
Scanner 95%
Target:
VMware vCenter Server (versions < 7.0.U1c, < 6.7.U3l, < 6.5.U3n)
No auth needed
Prerequisites:
Network access to target vCenter Server
nomisec
WRITEUP
10 stars
by orangmuda · remote
https://github.com/orangmuda/CVE-2021-21972
This repository provides a detailed technical analysis of CVE-2021-21972, an unauthorized file upload vulnerability in VMware vCenter Server leading to RCE. It includes a breakdown of the vulnerable code in `ServicesController.class`, exploitation steps, and verification methods.
Classification
Writeup 95%
Target:
VMware vCenter Server 6.5, 6.7, 7.0
No auth needed
Prerequisites:
Network access to the vulnerable vCenter Server endpoint · Ability to craft and upload a malicious .tar archive
nomisec
SCANNER
7 stars
by yaunsky · infoleak
https://github.com/yaunsky/CVE-2021-21972
The repository contains a Python script that scans for CVE-2021-21972 by checking if the target endpoint returns a 405 status code, indicating potential vulnerability. It does not include exploit code for achieving RCE but confirms the presence of the vulnerable endpoint.
Classification
Scanner 90%
Target:
VMware vCenter Server (versions 6.5, 6.7, 7.0)
No auth needed
Prerequisites:
Network access to the vCenter Server on port 443
nomisec
WRITEUP
6 stars
by murataydemir · remote
https://github.com/murataydemir/CVE-2021-21972
This repository provides a detailed technical analysis of CVE-2021-21972, an unauthorized file upload vulnerability in VMware vCenter Server leading to RCE. It includes vulnerability root cause analysis, affected code snippets, and exploitation steps but lacks functional exploit code.
Classification
Writeup 95%
Target:
VMware vCenter Server 6.5, 6.7, 7.0
No auth needed
Prerequisites:
Network access to vulnerable vCenter Server · vRealize Operations vCenter Plugin enabled (default in vCenter Server)
nomisec
SCANNER
3 stars
by ByZain · remote
https://github.com/ByZain/CVE-2021-21972
This Go-based tool scans for CVE-2021-21972 by checking if the target endpoint `/ui/vropspluginui/rest/services/uploadova` returns a 405 status code, indicating potential vulnerability. It supports multi-threading and writes vulnerable URLs to a file.
Classification
Scanner 90%
Target:
VMware vRealize Operations Manager (vROps) prior to 8.4
No auth needed
Prerequisites:
List of target URLs in a file
nomisec
WORKING POC
3 stars
by haidv35 · poc
https://github.com/haidv35/CVE-2021-21972
This repository contains a functional exploit for CVE-2021-21972, a directory traversal vulnerability in VMware vCenter Server. The exploit allows an unauthenticated attacker to upload arbitrary files to the server, leading to remote code execution (RCE) by placing malicious files in specific directories.
Classification
Working Poc 95%
Target:
VMware vCenter Server (versions 6.5, 6.7, and 7.0)
No auth needed
Prerequisites:
Network access to the target vCenter Server · A file to upload (e.g., SSH key, webshell)
nomisec
WORKING POC
3 stars
by pettyhacks · remote
https://github.com/pettyhacks/vSphereyeeter
This repository contains a functional exploit for CVE-2021-21972, a remote code execution vulnerability in VMware vCenter Server. The exploit automates the process of generating an SSH keypair, creating a malicious archive with directory traversal, and sending it to the vulnerable endpoint to achieve RCE via SSH access.
Classification
Working Poc 95%
Target:
VMware vCenter Server (7.x before 7.0 U1c, 6.7 before 6.7 U3l, 6.5 before 6.5 U3n) and VMware Cloud Foundation (4.x before 4.2, 3.x before 3.10.1.2)
No auth needed
Prerequisites:
Network access to port 443 on the target vCenter Server · Python and Bash environment · evilarc.py script from a separate repository
nomisec
WORKING POC
2 stars
by renini · remote
https://github.com/renini/CVE-2021-21972
This PoC exploits CVE-2021-21972, a directory traversal vulnerability in VMware vCenter Server Appliance (VCSA) 6.7, by uploading a malicious OVA file to write an SSH authorized key to a privileged user's directory, enabling remote code execution.
Classification
Working Poc 95%
Target:
VMware vCenter Server Appliance (VCSA) 6.7
No auth needed
Prerequisites:
Python2 · curl · SSH key generation tools · Access to the target VCSA's vropspluginui endpoint
nomisec
SCANNER
1 stars
by robwillisinfo · infoleak
https://github.com/robwillisinfo/VMware_vCenter_CVE-2021-21972
This repository contains a PowerShell script that scans for VMware vCenter CVE-2021-21972 by checking for specific HTTP responses (405 for vulnerable, 401 for patched) from the `/ui/vropspluginui/rest/services/uploadova` endpoint. It does not exploit the vulnerability but detects its presence.
Classification
Scanner 100%
Target:
VMware vCenter Server
No auth needed
Prerequisites:
Network access to the target vCenter Server
nomisec
SUSPICIOUS
1 stars
by Osyanina · poc
https://github.com/Osyanina/westone-CVE-2021-21972-scanner
The repository claims to be a scanner for CVE-2021-21972 but lacks actual exploit code or technical details. It instructs users to download and run an executable without providing source code or analysis.
Classification
Suspicious 90%
Target:
VMware vCenter Server (versions 7.0, 6.7, 6.5)
No auth needed
Prerequisites:
Access to port 443 on the target vCenter Server
nomisec
WORKING POC
1 stars
by L-pin · remote
https://github.com/L-pin/CVE-2021-21972
This repository contains a functional exploit for CVE-2021-21972, a directory traversal vulnerability in VMware vCenter Server. The exploit crafts a malicious tar file to write arbitrary files (e.g., SSH keys or JSP webshells) to sensitive locations on both Linux and Windows systems via the `/ui/vropspluginui/rest/services/uploadova` endpoint.
Classification
Working Poc 95%
Target:
VMware vCenter Server (versions affected by CVE-2021-21972)
No auth needed
Prerequisites:
Network access to the vCenter Server UI endpoint · A file (e.g., JSP webshell or SSH key) to upload
nomisec
SUSPICIOUS
by SimoesCTT · poc
https://github.com/SimoesCTT/CTT-enhanced-VMware-vCenter
The repository claims to exploit CVE-2021-21972 but contains no functional exploit code, instead focusing on vague 'CTT temporal resonance' concepts and external timing mechanisms. The actual vulnerability interaction is truncated, and the code appears to be a lure with buzzwords rather than a legitimate PoC.
Classification
Suspicious 90%
Target:
VMware vCenter Server
No auth needed
Prerequisites:
Network access to vCenter Server
gitlab
SCANNER
by VoXaN24 · poc
https://gitlab.com/VoXaN24/CVE-2021-21972
This repository contains an Nmap script designed to detect the presence of CVE-2021-21972, a remote code execution vulnerability in VMware vCenter Server. The script scans for the vulnerability but does not include functional exploit code.
Classification
Scanner 90%
Target:
VMware vCenter Server
No auth needed
Prerequisites:
Nmap installed · Network access to target vCenter Server on port 443
gitlab
SCANNER
by securitystuffbackup · poc
https://gitlab.com/securitystuffbackup/CVE-2021-21972
This repository provides a detection script for CVE-2021-21972, a remote code execution vulnerability in VMware vCenter Server. It checks for the presence of the vulnerable endpoint '/ui/vropspluginui/rest/services/uploadova' and verifies the response for indicators of vulnerability.
Classification
Scanner 90%
Target:
VMware vCenter Server 6.5-7.0
No auth needed
Prerequisites:
network access to port 443
nomisec
SCANNER
by JMousqueton · remote
https://github.com/JMousqueton/Detect-CVE-2021-21972
The repository contains a Python script that scans for CVE-2021-21972 by sending HTTP requests to a specific endpoint and checking for a 405 status code response. It does not include exploit code but detects potential vulnerabilities.
Classification
Scanner 90%
Target:
VMware vRealize Operations Manager (vROps)
No auth needed
Prerequisites:
Network access to the target system
nomisec
WORKING POC
by d3sh1n · remote
https://github.com/d3sh1n/cve-2021-21972
This repository contains a functional exploit for CVE-2021-21972, a directory traversal vulnerability in VMware vSphere. The PoC leverages a tarfile upload mechanism to write arbitrary files, enabling SSH key injection or JSP webshell deployment for remote code execution.
Classification
Working Poc 95%
Target:
VMware vSphere (vCenter Server)
No auth needed
Prerequisites:
Network access to the vSphere UI endpoint · Ability to send HTTP requests to the target
nomisec
WORKING POC
by TAI-REx · poc
https://github.com/TAI-REx/CVE-2021-21972
This repository contains a functional exploit for CVE-2021-21972, targeting VMware vCenter Server versions 6.5 to 7.0. The exploit leverages a directory traversal vulnerability to write an SSH authorized key, enabling remote code execution via SSH.
Classification
Working Poc 95%
Target:
VMware vCenter Server 6.5-7.0
No auth needed
Prerequisites:
Network access to the target vCenter Server · SSH access to the target after exploit execution
nomisec
WORKING POC
by user16-et · remote
https://github.com/user16-et/cve-2021-21972_PoC
This repository contains a functional exploit PoC for CVE-2021-21972, an unauthorized file upload vulnerability in VMware vCenter Server. The exploit leverages a directory traversal flaw in the vRealize Operations vCenter Plugin to upload arbitrary files, enabling remote code execution.
Classification
Working Poc 95%
Target:
VMware vCenter Server (7.x before 7.0 U1c, 6.7 before 6.7 U3l, 6.5 before 6.5 U3n)
No auth needed
Prerequisites:
Network access to port 443 on the target vCenter Server
exploitdb
WORKING POC
by CHackA0101 · pythonwebappsmultiple
https://www.exploit-db.com/exploits/50056
This exploit targets CVE-2021-21972, an unauthenticated RCE vulnerability in VMware vCenter Server. It uploads a malicious JSP file and a reverse shell script via a tar archive, then triggers execution to achieve remote code execution.
Classification
Working Poc 95%
Target:
VMware vCenter Server (6.5, 6.7, 7.0)
No auth needed
Prerequisites:
Network access to the target vCenter Server · Target must be vulnerable to CVE-2021-21972
vulncheck_xdb
STUB
remote
https://github.com/DougCarroll/CVE_2021_21972
The repository contains only Python virtual environment files and dependencies (certifi, chardet) without any actual exploit code or technical details related to CVE-2021-21972.
Target:
unknown
No auth needed
exploitdb
WORKING POC
by Photubias · pythonwebappsmultiple
https://www.exploit-db.com/exploits/49602
This exploit leverages an unauthenticated file upload vulnerability in VMware vCenter Server (CVE-2021-21972) to upload malicious files, including SSH keys or JSP webshells, depending on the target version. It includes version detection and payload customization for different vCenter versions.
Classification
Working Poc 95%
Target:
VMware vCenter Server 6.5, 6.7, and 7.0 (specific builds)
No auth needed
Prerequisites:
Network access to the vCenter Server · Vulnerable vCenter version
metasploit
WORKING POC
MANUAL
by Mikhail Klyuchnikov, wvu, mr_me, Viss · rubypoclinux
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/vmware_vcenter_uploadova_rce.rb
This Metasploit module exploits an unauthenticated OVA file upload and path traversal vulnerability in VMware vCenter Server to achieve remote code execution by writing a JSP payload to a web-accessible directory.
Classification
Working Poc 100%
Target:
VMware vCenter Server <= 6.7 Update 3j
No auth needed
Prerequisites:
Network access to the target vCenter Server · Target running a vulnerable version of VMware vCenter Server