Challenge
XML External Entity Processing vulnerabilities in Veeam ONE Reporter component lead to an ability to read arbitrary files without authentication.The severity of the vulnerabilities is critical, the CVSS v3 score is 7.5.
Cause
Veeam ONE Reporter uses XML files for importing and exporting report templates. A remote attacker may send malicious data in the HTTP request sent to the Veeam ONE Reporter web server (default port 1239) which will be parsed due to lack of XML input validation. The exploitation of the vulnerabilities may lead to the disclosure of confidential data. These vulnerabilities are tracked as ZDI-CAN-10709 and ZDI-CAN-10710.Solution
Hotfixes available for the following versions of Veeam ONE:- 10 (build 10.0.0.750)
- 9.5 Update 4a (build 9.5.4.4587)
The hotfixes must be installed on the Veeam ONE server.
More Information
[[DOWNLOAD|DOWNLOAD HOTFIX FOR VEEAM ONE 10|https://www.veeam.com/download_add_packs/virtualization-management-one-solution/10.0.0.750_KB3221/]]MD5: e718428479bfbdade3a007c993db3e7d
SHA-1: a75e610a54105282e2ae4770843f53989531410e
[[DOWNLOAD|DOWNLOAD HOTFIX FOR VEEAM ONE 9.5 U4A|https://www.veeam.com/download_add_packs/virtualization-management-one-solution/9.5.4.4587_KB3221/]]
MD5: cd245dc3e797c4d1ec46e4494a84a5fb
SHA-1: 3d3b2b9bdfe6310a4cf72fe9fc041ba58f4b0bca