#VU39958 XML External Entity injection in vCenter Server


| Updated: 2020-08-09

Vulnerability identifier: #VU39958

Vulnerability risk: Medium

CVSSv3.1: 6.7 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2016-7459

CWE-ID: CWE-611

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
vCenter Server
Server applications / Virtualization software

Vendor: VMware, Inc

Description

The vulnerability allows a remote authenticated user to gain access to sensitive information.

VMware vCenter Server 5.5 before U3e and 6.0 before U2a allows remote authenticated users to read arbitrary files via a (1) Log Browser, (2) Distributed Switch setup, or (3) Content Library XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.

Mitigation
Install update from vendor's website.

Vulnerable software versions

vCenter Server: 5.0 - 6.0


External links
http://www.securityfocus.com/bid/94486
http://www.securitytracker.com/id/1037329
http://www.vmware.com/security/advisories/VMSA-2016-0022.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability