ID CVE-2016-7462
Summary The Suite REST API in VMware vRealize Operations (aka vROps) 6.x before 6.4.0 allows remote authenticated users to write arbitrary content to files or rename files via a crafted DiskFileItem in a relay-request payload that is mishandled during deserialization.
References
Vulnerable Configurations
  • cpe:2.3:a:vmware:vrealize_operations:6.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vrealize_operations:6.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vrealize_operations:6.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vrealize_operations:6.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vrealize_operations:6.2.0a:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vrealize_operations:6.2.0a:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vrealize_operations:6.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vrealize_operations:6.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vrealize_operations:6.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vrealize_operations:6.3.0:*:*:*:*:*:*:*
CVSS
Base: 7.5 (as of 28-07-2017 - 01:29)
Impact:
Exploitability:
CWE CWE-749
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW SINGLE
Impact
ConfidentialityIntegrityAvailability
NONE PARTIAL COMPLETE
cvss-vector via4 AV:N/AC:L/Au:S/C:N/I:P/A:C
refmap via4
bid 94351
confirm http://www.vmware.com/security/advisories/VMSA-2016-0020.html
misc https://www.tenable.com/security/research/tra-2016-34
sectrack 1037297
Last major update 28-07-2017 - 01:29
Published 29-12-2016 - 09:59
Last modified 28-07-2017 - 01:29
Back to Top