{"vulnerability": "CVE-2021-22022", "sightings": [{"uuid": "6f2ed210-ece9-417c-a193-4b5ab022b847", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-22022", "type": "seen", "source": "https://t.me/cibsecurity/28035", "content": "\u203c CVE-2021-22022 \u203c\n\nThe vRealize Operations Manager API (8.x prior to 8.5) contains an arbitrary file read vulnerability. A malicious actor with administrative access to vRealize Operations Manager API can read any arbitrary file on server leading to information disclosure.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-08-30T22:32:53.000000Z"}, {"uuid": "9b5a7fbc-37b4-4a8a-b496-1b12d12119c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-22022", "type": "seen", "source": "https://t.me/cKure/6765", "content": "\u25a0\u25a0\u25a1\u25a1\u25a1 VMware fixed two vulnerabilities in vRealize Operations Manager.\n\n1\u20e3 CVE-2021-22022 - Arbitrary File Read\n2\u20e3 CVE-2021-22023 - Insecure Direct Object Reference\n\nCredits: https://twitter.com/elk0kc (Egor Dimitrenko)\n\nDetails: https://www.vmware.com/security/advisories/VMSA-2021-0018.html", "creation_timestamp": "2021-08-25T13:29:31.000000Z"}]}