Quantcast
Channel: Veeam Support Knowledge Base
Viewing all articles
Browse latest Browse all 4362

Veeam ONE XML External Entity Processing vulnerabilities

$
0
0

Challenge

XML External Entity Processing vulnerabilities in Veeam ONE Reporter component lead to an ability to read arbitrary files without authentication.
The severity of the vulnerabilities is critical, the CVSS v3 score is 7.5.

Cause

Veeam ONE Reporter uses XML files for importing and exporting report templates. A remote attacker may send malicious data in the HTTP request sent to the Veeam ONE Reporter web server (default port 1239) which will be parsed due to lack of XML input validation. The exploitation of the vulnerabilities may lead to the disclosure of confidential data. These vulnerabilities are tracked as ZDI-CAN-10709 and ZDI-CAN-10710.

Solution

Hotfixes available for the following versions of Veeam ONE:  
  • 10 (build 10.0.0.750)
  • 9.5 Update 4a (build 9.5.4.4587)
NOTE: These hotfixes are not compatible with version 9.5 Update 4 (build 9.5.4.4566). Customers running this version are advised to upgrade to version 10 or 9.5 Update 4a and then apply the corresponding hotfixes.

The hotfixes must be installed on the Veeam ONE server.

More Information

[[DOWNLOAD|DOWNLOAD HOTFIX FOR VEEAM ONE 10|https://www.veeam.com/download_add_packs/virtualization-management-one-solution/10.0.0.750_KB3221/]]
MD5: e718428479bfbdade3a007c993db3e7d
SHA-1: a75e610a54105282e2ae4770843f53989531410e

[[DOWNLOAD|DOWNLOAD HOTFIX FOR VEEAM ONE 9.5 U4A|https://www.veeam.com/download_add_packs/virtualization-management-one-solution/9.5.4.4587_KB3221/]]
MD5: cd245dc3e797c4d1ec46e4494a84a5fb
SHA-1: 3d3b2b9bdfe6310a4cf72fe9fc041ba58f4b0bca

Viewing all articles
Browse latest Browse all 4362

Trending Articles