Vulnerabilities > CVE-2016-7462 - Exposed Dangerous Method or Function vulnerability in VMWare Vrealize Operations

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
SINGLE
Confidentiality impact
NONE
Integrity impact
PARTIAL
Availability impact
COMPLETE
network
low complexity
vmware
CWE-749
nessus

Summary

The Suite REST API in VMware vRealize Operations (aka vROps) 6.x before 6.4.0 allows remote authenticated users to write arbitrary content to files or rename files via a crafted DiskFileItem in a relay-request payload that is mishandled during deserialization.

Common Weakness Enumeration (CWE)

Nessus

NASL familyCGI abuses
NASL idVMWARE_VREALIZE_OPERATIONS_MANAGER_V640_DESERIALIZATION.NASL
descriptionThe version of VMware vRealize Operations (vROps) Manager running on the remote web server is 6.x prior to 6.40. It is, therefore, affected by a flaw in the Suite API CollectorHttpRelayController component due to improper validation of DiskFileItem objects stored in the
last seen2020-06-01
modified2020-06-02
plugin id95441
published2016-12-01
reporterThis script is Copyright (C) 2016-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
sourcehttps://www.tenable.com/plugins/nessus/95441
titleVMware vRealize Operations Manager ver 6.x < 6.40 Suite API CollectorHttpRelayController RelayRequest Object DiskFileItem Deserialization DoS