Security News > 2020 > May > Remote Code Execution Vulnerability Patched in VMware Cloud Director
VMware informed customers on Tuesday that it has patched a high-severity remote code execution vulnerability in its Cloud Director product.
The vulnerability, tracked as CVE-2020-3956, has been described as a code injection issue that allows an authenticated attacker to send malicious traffic to Cloud Director, which could result in arbitrary code execution.
"This vulnerability can be exploited through the HTML5- and Flex-based UIs, the API Explorer interface and API access," VMware said in its advisory.
The security flaw impacts VMware Cloud Director 10.0.x, 9.7.x and 9.5.x on Linux and Photon OS appliances, and version 9.1.x on Linux.
In April, the virtualization giant patched a critical vulnerability that can be exploited by hackers to compromise vCenter Server or other services.
News URL
Related Vulnerability
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2020-05-20 | CVE-2020-3956 | Expression Language Injection vulnerability in VMWare Vcloud Director VMware Cloud Director 10.0.x before 10.0.0.2, 9.7.0.x before 9.7.0.5, 9.5.0.x before 9.5.0.6, and 9.1.0.x before 9.1.0.4 do not properly handle input leading to a code injection vulnerability. | 8.8 |