| Vulnerability Name: | CVE-2021-21978 (CCN-197669) | ||||||||||||
| Assigned: | 2021-03-02 | ||||||||||||
| Published: | 2021-03-02 | ||||||||||||
| Updated: | 2021-03-26 | ||||||||||||
| Summary: | VMware View Planner 4.x prior to 4.6 Security Patch 1 contains a remote code execution vulnerability. Improper input validation and lack of authorization leading to arbitrary file upload in logupload web application. An unauthorized attacker with network access to View Planner Harness could upload and execute a specially crafted file leading to remote code execution within the logupload container. | ||||||||||||
| CVSS v3 Severity: | 9.8 Critical (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) 9.1 Critical (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C)
8.0 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L/E:F/RL:O/RC:C)
| ||||||||||||
| CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||||||
| Vulnerability Type: | CWE-434 | ||||||||||||
| Vulnerability Consequences: | Gain Access | ||||||||||||
| References: | Source: MITRE Type: CNA CVE-2021-21978 Source: MISC Type: Exploit, Third Party Advisory, VDB Entry http://packetstormsecurity.com/files/161879/VMware-View-Planner-4.6-Remote-Code-Execution.html Source: XF Type: UNKNOWN vmware-cve202121978-file-upload(197669) Source: CCN Type: Packet Storm Security [03-19-2021] VMware View Planner 4.6 Remote Code Execution Source: CCN Type: Rapid7 Vulnerability and Exploit Database [07-30-2020] VMware View Planner Unauthenticated Log File Upload RCE Source: CCN Type: VMware Security Advisory VMSA-2021-0003 VMware View Planner update addresses remote code execution vulnerability (CVE-2021-21978) Source: MISC Type: Vendor Advisory https://www.vmware.com/security/advisories/VMSA-2021-0003.html | ||||||||||||
| Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||
| BACK | |||||||||||||