Multiple vulnerabilities in VMware vRealize Automation

Published: 2018-04-13 13:02:07 | Updated: 2018-04-13 13:07:36
Severity Low
Patch available YES
Number of vulnerabilities 2
CVE ID CVE-2018-6958
CVE-2018-6959
CVSSv3 5.3 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:U/RL:O/RC:C]
6.4 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C]
CWE ID CWE-79
CWE-264
Exploitation vector Network
Public exploit Not available
Vulnerable software vRealize Automation
Vulnerable software versions vRealize Automation 7.3
vRealize Automation 7.2
vRealize Automation 7.1
vRealize Automation 7.0
Vendor URL VMware, Inc

Security Advisory

1) Cross-site scripting

Description

The vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.

The weakness exists due to insufficient sanitization of user-supplied data. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.

Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.

Remediation

Update to version 7.3.1.

External links

https://www.vmware.com/security/advisories/VMSA-2018-0009.html

2) Security restrictions bypass

Description

The vulnerability allows a remote attacker to bypass security restrictions on the target system.

The weakness exists in the handling of session IDs due to missing renewal of session tokens. A remote attacker can bypass security restrictions and hijack a valid vRA user's session.

Remediation

Update to version 7.4.0.

External links

https://www.vmware.com/security/advisories/VMSA-2018-0009.html

Back to List