Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-4vwx-r658-c2mg

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Arbitrary file write vulnerability in vRealize Operations Manager API (CVE-2021-21983) prior to 8.4 may allow an authenticated malicious actor with network access to the vRealize Operations Manager API can write files to arbitrary locations on the underlying photon operating system.

Arbitrary file write vulnerability in vRealize Operations Manager API (CVE-2021-21983) prior to 8.4 may allow an authenticated malicious actor with network access to the vRealize Operations Manager API can write files to arbitrary locations on the underlying photon operating system.

EPSS

Процентиль: 99%
0.83177
Высокий

Связанные уязвимости

CVSS3: 6.5
nvd
почти 5 лет назад

Arbitrary file write vulnerability in vRealize Operations Manager API (CVE-2021-21983) prior to 8.4 may allow an authenticated malicious actor with network access to the vRealize Operations Manager API can write files to arbitrary locations on the underlying photon operating system.

CVSS3: 7.2
fstec
почти 5 лет назад

Уязвимость API-интерфейса инструмента мониторинга виртуальной инфраструктуры vRealize Operations, позволяющая нарушителю загружать вредоносные файлы

EPSS

Процентиль: 99%
0.83177
Высокий