TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Not a drill: VMware vuln with 9.8 severity rating is under attack

343 点作者 jbonniwell将近 4 年前

11 条评论

tptacek将近 4 年前
Just a reminder that these severity ratings, while often directionally useful (a 9.x probably is something you should care about if you run the target software; a 2.x is <i>probably</i> not), the ratings themselves are total horseshit and are running industry joke; literally a Ouija board, starting from a hopelessly ambiguous &quot;calculator&quot; that you run and then apply subtle inputs to to get the score where you want it to be.
评论 #27401592 未加载
评论 #27402385 未加载
评论 #27401037 未加载
评论 #27401096 未加载
评论 #27404999 未加载
评论 #27401117 未加载
评论 #27424736 未加载
评论 #27403401 未加载
评论 #27401346 未加载
评论 #27402844 未加载
nick__m将近 4 年前
A poc appears to be available there : <a href="https:&#x2F;&#x2F;github.com&#x2F;xnianq&#x2F;cve-2021-21985_exp" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;xnianq&#x2F;cve-2021-21985_exp</a> !<p>P.s. I use yandex to find CVE POC, google is almost useless for that kind of search and yandex almost always deliver working code !
评论 #27402784 未加载
评论 #27402864 未加载
评论 #27402340 未加载
anonymousiam将近 4 年前
It&#x27;s safe to say that anybody who exposes VCenter directly to the web is practicing poor security. I cannot imagine any scenario where this would be required. I manage a few VxRail&#x2F;vSphere clusters and everything is behind firewalls and VPNs.<p>That said, I understand that this vulnerability basically gives root to anyone with VPN access. In our case, pretty much anyone who has VPN access to the cluster already has root on it anyway.
评论 #27415661 未加载
na85将近 4 年前
It can&#x27;t be <i>that</i> bad, since I haven&#x27;t seen a flashy website for this vuln, complete with a logo, making the rounds on social media.
评论 #27402289 未加载
评论 #27402882 未加载
评论 #27402877 未加载
justusthane将近 4 年前
If you don&#x27;t use the vCenter plugins in which the vulnerabilities exist (vSAN Health Check, vROPS Manager), it&#x27;s incredibly easy to mitigate this vulnerability by manually marking these plugins as incompatible: <a href="https:&#x2F;&#x2F;kb.vmware.com&#x2F;s&#x2F;article&#x2F;83829" rel="nofollow">https:&#x2F;&#x2F;kb.vmware.com&#x2F;s&#x2F;article&#x2F;83829</a>
评论 #27401925 未加载
merb将近 4 年前
why do people putting their vmware vcenter onto the internet?
评论 #27400484 未加载
评论 #27403173 未加载
评论 #27400245 未加载
评论 #27400424 未加载
评论 #27400754 未加载
colonelxc将近 4 年前
Not even the first preauth VSphere RCE this year: <a href="https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-21972" rel="nofollow">https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-2197...</a>
ssakamoto将近 4 年前
Website in tweet appears to be filled with suspicious malware like contents, beware
terminalserver将近 4 年前
9.8 out of 10?<p>What’s the .2 represent?
评论 #27404508 未加载
评论 #27404454 未加载
hgo将近 4 年前
Dear arstechnica, please don&#x27;t write articles like this, where you make it seem like curl is somehow related or even the cause: &quot;It can be reproduced using five requests from cURL, a command-line tool that transfers data using HTTP, HTTPS, IMAP, and other common Internet protocols.&quot; I find it quite untasteful to somehow sneak an plug for curl in here at all.<p>Thinking of: “I will slaughter you”, where Daniel explains how he gets death threats from clueless sysadmins that see that they have been hacked by someone that used curl.<p><a href="https:&#x2F;&#x2F;daniel.haxx.se&#x2F;blog&#x2F;2021&#x2F;02&#x2F;19&#x2F;i-will-slaughter-you&#x2F;" rel="nofollow">https:&#x2F;&#x2F;daniel.haxx.se&#x2F;blog&#x2F;2021&#x2F;02&#x2F;19&#x2F;i-will-slaughter-you&#x2F;</a><p>Edit: I have e-mailed the author, but someone that use Twitter may want to try and reach the author on @dangoodin001. Thank you.
评论 #27403925 未加载
评论 #27403932 未加载
评论 #27406212 未加载
评论 #27405655 未加载
评论 #27405297 未加载
评论 #27405321 未加载
gwbas1c将近 4 年前
I worked briefly at VMware. An exploit like this doesn&#x27;t surprise me one bit.<p>We had a company mailing list that people used to email jokes back and forth all the time.<p>One rather ignorant programmer put a rule on his email where he would get an alert whenever anybody emailed him with a particular word in the subject line. That word happened to get into a rather popular email thread, and in the middle of the thread we started getting complaints from him asking us to change the subject line because his pager was beeping off the hook.<p>Career limiting move! He took a lot of heat for making poor assumptions.
评论 #27401238 未加载
评论 #27403237 未加载