Multiple vulnerabilities in VMware vRealize Automation

Published: 2018-04-13 13:02:07 | Updated: 2018-04-13 13:07:36
Severity Low
Patch available YES
Number of vulnerabilities 2
CVE ID CVE-2018-6958
CVE-2018-6959
CVSSv3 5.3 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:U/RL:O/RC:C]
6.4 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C]
CWE ID CWE-79
CWE-264
Exploitation vector Network
Public exploit Not available
Vulnerable software vRealize Automation
Vulnerable software versions vRealize Automation 7.3
vRealize Automation 7.2
vRealize Automation 7.1
vRealize Automation 7
Vendor URL VMware, Inc

Security Advisory

1) Cross-site scripting

Description

The vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.

The weakness exists due to insufficient sanitization of user-supplied data. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.

Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.

Remediation

Update to version 7.3.1.

External links

https://www.vmware.com/security/advisories/VMSA-2018-0009.html

2) Security restrictions bypass

Description

The vulnerability allows a remote attacker to bypass security restrictions on the target system.

The weakness exists in the handling of session IDs due to missing renewal of session tokens. A remote attacker can bypass security restrictions and hijack a valid vRA user's session.

Remediation

Update to version 7.4.0.

External links

https://www.vmware.com/security/advisories/VMSA-2018-0009.html

Back to List