Lucene search

K
veeamVeeam softwareVEEAM:KB3221
HistoryJul 07, 2020 - 12:00 a.m.

Veeam ONE XML External Entity Processing vulnerabilities

2020-07-0700:00:00
Veeam software
www.veeam.com
9

CVSS2

7.8

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:C/I:N/A:N

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

AI Score

7.2

Confidence

Low

Challenge

XML External Entity Processing vulnerabilities in Veeam ONE Reporter make possible to read arbitrary files without authentication.
Severity: critical CVSS v3 score: 7.5

Cause

Veeam ONE Reporter uses XML files for importing and exporting report templates. A remote attacker may send malicious data in the HTTP request to the Veeam ONE Reporter web server (default port 1239). The request will be parsed due to lack of XML input validation. The exploitation of the vulnerabilities may lead to the disclosure of confidential data. These vulnerabilities are tracked as ZDI-CAN-10709 (CVE-2020-15418) andZDI-CAN-10710 (CVE-2020-15419).

Solution

Hotfixes available for the following versions of Veeam ONE:

  • 10 (build 10.0.0.750)
  • 9.5 Update 4a (build 9.5.4.4587)
    NOTE: These hotfixes are not compatible with version 9.5 Update 4 (build 9.5.4.4566). Customers running this version are advised to upgrade to version 10 or 9.5 Update 4a and then apply the hotfixes.

The hotfixes must be installed on the Veeam ONE server.

More Information

These vulnerabilities were discovered by:
rgod working with Trend Micro Zero Day Initiative

DOWNLOAD HOTFIX FOR VEEAM ONE 10

MD5: e718428479bfbdade3a007c993db3e7d SHA-1: a75e610a54105282e2ae4770843f53989531410e

DOWNLOAD HOTFIX FOR VEEAM ONE 9.5 U4A

MD5: cd245dc3e797c4d1ec46e4494a84a5fb SHA-1: 3d3b2b9bdfe6310a4cf72fe9fc041ba58f4b0bca

To submit feedback regarding this article, please click this link: Send Article Feedback
To report a typo on this page, highlight the typo with your mouse and press CTRL + Enter.

CVSS2

7.8

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:C/I:N/A:N

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

AI Score

7.2

Confidence

Low