Security News > 2020 > May > Remote Code Execution Vulnerability Patched in VMware Cloud Director

Remote Code Execution Vulnerability Patched in VMware Cloud Director
2020-05-20 13:20

VMware informed customers on Tuesday that it has patched a high-severity remote code execution vulnerability in its Cloud Director product.

The vulnerability, tracked as CVE-2020-3956, has been described as a code injection issue that allows an authenticated attacker to send malicious traffic to Cloud Director, which could result in arbitrary code execution.

"This vulnerability can be exploited through the HTML5- and Flex-based UIs, the API Explorer interface and API access," VMware said in its advisory.

The security flaw impacts VMware Cloud Director 10.0.x, 9.7.x and 9.5.x on Linux and Photon OS appliances, and version 9.1.x on Linux.

In April, the virtualization giant patched a critical vulnerability that can be exploited by hackers to compromise vCenter Server or other services.


News URL

http://feedproxy.google.com/~r/Securityweek/~3/HLzP0dUVzs8/remote-code-execution-vulnerability-patched-vmware-cloud-director

Related Vulnerability

DATE CVE VULNERABILITY TITLE RISK
2020-05-20 CVE-2020-3956 Expression Language Injection vulnerability in VMWare Vcloud Director
VMware Cloud Director 10.0.x before 10.0.0.2, 9.7.0.x before 9.7.0.5, 9.5.0.x before 9.5.0.6, and 9.1.0.x before 9.1.0.4 do not properly handle input leading to a code injection vulnerability.
network
low complexity
vmware CWE-917
8.8

Related vendor

VENDOR LAST 12M #/PRODUCTS LOW MEDIUM HIGH CRITICAL TOTAL VULNS
Vmware 146 11 222 256 102 591