First published: Mon Aug 30 2021(Updated: )
The vRealize Operations Manager API (8.x prior to 8.5) contains a Server Side Request Forgery in an end point. An unauthenticated malicious actor with network access to the vRealize Operations Manager API can perform a Server Side Request Forgery attack leading to information disclosure.
Credit: security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
VMware Cloud Foundation | >=3.0<=3.10.2.1 | |
VMware Cloud Foundation | >=4.0<=4.2.1 | |
Vmware Vrealize Operations Manager | >=8.0.0<8.5.0 | |
Vmware Vrealize Operations Manager | =7.5.0 | |
Vmware Vrealize Suite Lifecycle Manager | >=8.0<=8.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-22027 is a vulnerability in the vRealize Operations Manager API (8.x prior to 8.5) that allows an unauthenticated malicious actor to perform a Server Side Request Forgery attack leading to information disclosure.
CVE-2021-22027 has a severity rating of 7.5 (high).
VMware Cloud Foundation versions 3.0 to 3.10.2.1, VMware Cloud Foundation versions 4.0 to 4.2.1, VMware vRealize Operations Manager versions 8.0.0 to 8.4.0, and VMware vRealize Operations Manager version 7.5.0 are affected by CVE-2021-22027.
An unauthenticated malicious actor with network access to the vRealize Operations Manager API can exploit CVE-2021-22027 by performing a Server Side Request Forgery attack.
You can find more information about CVE-2021-22027 at this link: https://www.vmware.com/security/advisories/VMSA-2021-0018.html.