BOOK THIS SPACE FOR AD
ARTICLE AD
## https://sploitus.com/exploit?id=EAE84183-EEEC-5C93-AB4F-725AD31987F9
# CVE-2021-39144-XSTREAM-RCE
[![Hits](https://hits.seeyoufarm.com/api/count/incr/badge.svg?url=https%3A%2F%2Fgithub.com%2Fb3wT%2FCVE-2021-39144-XSTREAM-RCE&count_bg=%2379C83D&title_bg=%23555555&icon=&icon_color=%23E7E7E7&title=vm-xstream&edge_flat=false)](https://hits.seeyoufarm.com)
</p>
{VMware Cloud Foundation} remote code execution vulnerability via XStream (CVE-2021-39144)
# Description
- VMware Cloud Foundation contains an unauthenticated remote code execution vulnerability via XStream open source library.
- VMware has evaluated the severity of this issue to be in the Critical severity range with a maximum CVSSv3 base score of 9.8
# usage:
```
_______ _______ __ __ ___ _________
| _ "\ /" __ )|" |/ \| "|(" "\
(. |_) :)(__/ _) ./|' / \: | \___/ :/
|: \/ / // |: /' | / //
(| _ \ __ \_ \ \// /' | __\ ./
|: |_) :)(: \__) :\ / / \ | (: \_/ \
(_______/ \_______)|___/ \___| \_______)
coded by b3w7
usage: vm-xstream.py [-h] [-u URL] [-f FILE] [-c CMD]
options:
-h, --help show this help message and exit
-u URL, --url URL Target URL; Example:http://ip:port
-f FILE, --file FILE Url File; Example:url.txt
-c CMD, --cmd CMD Commands to be executed(whoami as default)
```
# disclaimer:
the author don have any responsibility from misusing the tool
</p>
made for educational purpose only
# links:
- [official advisory](https://www.vmware.com/security/advisories/VMSA-2022-0027.html)
- [blog post(credits goes here)](https://srcincite.io/blog/2022/10/25/eat-what-you-kill-pre-authenticated-rce-in-vmware-nsx-manager.html)
# someone said coffee?
- [here you can buy me one/more](https://www.buymeacoffee.com/b3wt)