VMSA-2018-0009 vRealize Automation updates address multiple security issues

vRealize Automation updates address multiple security issues
VMware Security Advisory
 
Advisory ID:
VMSA-2018-0009
Severity:
Important
Synopsis:
vRealize Automation updates address multiple security issues.
Issue date:
2018-04-12
Updated on:
2018-04-12 (Initial Advisory)
CVE numbers:
CVE-2018-6958, CVE-2018-6959
 
1. Summary
vRealize Automation (vRA) updates address multiple security issues.

2. Relevant Products
  • vRealize Automation (vRA)
3. Problem Description
a. DOM-based cross-site scripting (XSS) vulnerability.


VMware vRealize Automation contains a vulnerability that may allow for a DOM-based cross-site scripting (XSS) attack. Exploitation of this issue may lead to the compromise of the vRA user's workstation.

VMware would like to thank Oliver Matula and Benjamin Schwendemann of ERNW Enno Rey Netzwerke GmbH for reporting this issue to us.

The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2018-6958 to this issue.


Column 5 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available.
VMware Product
Product Version
Running on
Severity
Replace with/ Apply Patch
Mitigation/ Workaround
vRA
7.3.x
VA
Important
None
vRA
7.2.x
VA
Important
None
vRA
7.1.x
VA
Important
None
vRA
7.0.x
VA
Important
None
vRA
6.2.x
VA
N/A
not affected
N/A



b. Missing renewal of session tokens vulnerability


VMware vRealize Automation contains a vulnerability in the handling of session IDs. Exploitation of this issue may lead to the hijacking of a valid vRA user's session.

VMware would like to thank Oliver Matula and Benjamin Schwendemann of ERNW Enno Rey Netzwerke GmbH for reporting this issue to us.
 

The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2018-6959 to this issue.


Column 5 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available.
VMware Product
Product Version
Running on
Severity
Replace with/ Apply Patch
Mitigation/ Workaround
vRA
7.3.x
VA
Moderate
None
vRA
7.2.x
VA
Moderate
None
vRA
7.1.x
VA
Moderate
None
vRA
7.0.x
VA
Moderate
None
vRA
6.2.x
VA
N/A
not affected
N/A


4. Solution

Please review the patch/release notes for your product and version and verify the checksum of your downloaded file.

VMware vRealize Automation 7.3.1

Downloads: 
https://my.vmware.com/web/vmware/info/slug/infrastructure_operations_management/vmware_vrealize_automation/7_3
Documentations:
https://docs.vmware.com/en/vRealize-Automation/index.html

VMware vRealize Automation 7.4.0
Downloads:
https://my.vmware.com/web/vmware/info/slug/infrastructure_operations_management/vmware_vrealize_automation/7_4
Documentations:
https://docs.vmware.com/en/vRealize-Automation/index.html

 

6. Change log


2018-04-12 VMSA-2018-0009
Initial security advisory in conjunction with the release of vRealize Automation 7.4.0 on 2018-04-12.

7. Contact


E-mail list for product security notifications and announcements:
http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce

This Security Advisory is posted to the following lists:
  security-announce@lists.vmware.com
  bugtraq@securityfocus.com
  fulldisclosure@seclists.org

E-mail: security@vmware.com
PGP key at:
https://kb.vmware.com/kb/1055

VMware Security Advisories
http://www.vmware.com/security/advisories

VMware Security Response Policy
https://www.vmware.com/support/policies/security_response.html

VMware Lifecycle Support Phases
https://www.vmware.com/support/policies/lifecycle.html

VMware Security & Compliance Blog 
https://blogs.vmware.com/security

Twitter
https://twitter.com/VMwareSRC


Copyright 2018 VMware Inc. All rights reserved.

コメント

このブログの人気の投稿

スフィロミニをスクラッチでうごかす Manipulate Sphero mini on Scratch

Cent OS 7.5 でタッチパッドが使えなかったのでその対応メモ

新しいWebベースのマルウェア配布チャネル「BlackTDS」サーフェス