1. Impacted Products
- VMware View Planner
A vulnerability in VMware View Planner was privately reported to VMware. An update is available to remediate this vulnerability in affected VMware products.
3. Advisory Details
Known Attack Vectors
Improper input validation and lack of authorization leading to arbitrary file upload in logupload web application. An unauthorized attacker with network access to View Planner Harness could upload and execute a specially crafted file leading to remote code execution within the logupload container.
To remediate CVE-2021-21978 apply the updates listed in the 'Fixed Version' column of the 'Response Matrix' below to affected deployments.
VMware would like to thank Mikhail Klyuchnikov of Positive Technologies for reporting this issue to us.
|Product||Version||Running On||CVE Identifier||CVSSv3||Severity||Fixed Version||Workarounds||Additional Documentation|
VMware View Planner
View Planner 4.6 Security Patch 1
VMware View Planner 4.6 Security Patch 1
Release Notes: https://docs.vmware.com/en/VMware-View-Planner/4.6/rn/VMware-View-Planner-46-Release-Notes.html
Mitre CVE Dictionary Links:
FIRST CVSSv3 Calculator:
5. Change Log
Initial security advisory.
E-mail list for product security notifications and announcements:
This Security Advisory is posted to the following lists:
PGP key at:
VMware Security Advisories
VMware Security Response Policy
VMware Lifecycle Support Phases
VMware Security & Compliance Blog
Copyright 2021 VMware Inc. All rights reserved.