Lucene search

K
cveVmwareCVE-2021-22027
HistoryAug 30, 2021 - 6:15 p.m.

CVE-2021-22027

2021-08-3018:15:08
CWE-918
vmware
web.nvd.nist.gov
40
cve-2021-22027
vrealize operations manager
api
server side request forgery
ssrf
information disclosure
nvd

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

AI Score

7.3

Confidence

High

EPSS

0.001

Percentile

49.8%

The vRealize Operations Manager API (8.x prior to 8.5) contains a Server Side Request Forgery in an end point. An unauthenticated malicious actor with network access to the vRealize Operations Manager API can perform a Server Side Request Forgery attack leading to information disclosure.

Affected configurations

Nvd
Node
vmwarecloud_foundationRange3.03.10.2.1
OR
vmwarecloud_foundationRange4.04.2.1
OR
vmwarevrealize_operations_managerRange8.0.08.5.0
OR
vmwarevrealize_operations_managerMatch7.5.0
OR
vmwarevrealize_suite_lifecycle_managerRange8.08.2
VendorProductVersionCPE
vmwarecloud_foundation*cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*
vmwarevrealize_operations_manager*cpe:2.3:a:vmware:vrealize_operations_manager:*:*:*:*:*:*:*:*
vmwarevrealize_operations_manager7.5.0cpe:2.3:a:vmware:vrealize_operations_manager:7.5.0:*:*:*:*:*:*:*
vmwarevrealize_suite_lifecycle_manager*cpe:2.3:a:vmware:vrealize_suite_lifecycle_manager:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "product": "VMware vRealize Operations",
    "vendor": "n/a",
    "versions": [
      {
        "status": "affected",
        "version": "VMware vRealize Operations (8.x prior to 8.5)"
      }
    ]
  }
]

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

AI Score

7.3

Confidence

High

EPSS

0.001

Percentile

49.8%

Related for CVE-2021-22027