First published: Wed Nov 24 2021(Updated: )
The vSphere Web Client (FLEX/Flash) contains an SSRF (Server Side Request Forgery) vulnerability in the vSAN Web Client (vSAN UI) plug-in. A malicious actor with network access to port 443 on vCenter Server may exploit this issue by accessing a URL request outside of vCenter Server or accessing an internal service.
Credit: security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
VMware vCenter Server | =6.5 | |
VMware vCenter Server | =6.7 | |
VMware vCenter Server | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-22049 is a vulnerability in the vSphere Web Client (FLEX/Flash) that allows for SSRF (Server Side Request Forgery) attacks.
CVE-2021-22049 has a severity rating of 9.8 (Critical) on the CVSS scale.
CVE-2021-22049 affects VMware vCenter Server versions 6.5, 6.7, and 7.0.
A malicious actor with network access to port 443 on vCenter Server can exploit CVE-2021-22049 by accessing URLs outside of vCenter Server or accessing internal services.
Yes, VMware has released a security advisory (VMSA-2021-0027) with patches and mitigations for CVE-2021-22049.