When running a security scan against vCenter Server 8.0.x, the following vulnerabilities might be reported:
CVE-2020-10108 | HTTP Request Smuggling Attacks |
CVE-2022-21712 | Cookie and Authorization headers are sent when following a cross-origin redirect with twisted.web.client |
CVE-2022-24801 | Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') in twisted.web |
CVE-2022-39348 | NameVirtualHost Host header injection |
VMware vCenter Server 8.0.x
CVE-2020-10108:
This is a false positive. Despite the HTTP response header mentioning TwistedWeb 19.10.0, Photon OS 4.0, which is used as the operating system for vCenter Server 8.0.x, does use a higher version of TwistedWeb, which is not vulnerable
CVE-2022-21712, CVE-2022-24801, and CVE-2022-39348:
These vulnerabilities have been fixed in vCenter Server 8.0 Update 3e (8.0.3 Patch 5)
If you are currently unable to update vCenter Server to 8.0 U3e, the following workaround steps can be used to mitigate these vulnerabilities by stopping and disabling the VMware POD service:
# service-control --stop vmware-pod
# systemctl disable vmware-pod.service