SB2022040614 - Multiple vulnerabilities in VMware vRealize Automation



SB2022040614 - Multiple vulnerabilities in VMware vRealize Automation

Published: April 6, 2022 Updated: September 4, 2024

Security Bulletin ID SB2022040614
Severity
High
Patch available
YES
Number of vulnerabilities 4
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 25% Low 75%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 4 secuirty vulnerabilities.


1) Deserialization of Untrusted Data (CVE-ID: CVE-2022-22957)

The vulnerability allows a remote user to execute arbitrary code on the target system.

The vulnerability exists due to insecure input validation when processing serialized data passed via the JDBC URI. A remote administrator can pass specially crafted data via the JDBC URI and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


2) Deserialization of Untrusted Data (CVE-ID: CVE-2022-22958)

The vulnerability allows a remote user to execute arbitrary code on the target system.

The vulnerability exists due to insecure input validation when processing serialized data passed via the JDBC URI. A remote administrator can pass specially crafted data via the JDBC URI and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


3) Cross-site request forgery (CVE-ID: CVE-2022-22959)

The vulnerability allows a remote attacker to perform cross-site request forgery attacks.

The vulnerability exists due to insufficient validation of the HTTP request origin. A remote attacker can trick the victim to visit a specially crafted web page and perform arbitrary actions on behalf of the victim on the vulnerable website and unintentionally validate a malicious JDBC URI.


4) Incorrect default permissions (CVE-ID: CVE-2022-22960)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to incorrect default permissions for support scripts. A local user with access to the system can overwrite files and execute arbitrary code with root privileges.


Remediation

Install update from vendor's website.