ESB-2018.1135 - [Virtual] vRealize Automation: Multiple vulnerabilities 2018-04-13

Printable version
PGP/GPG verifiable version

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2018.1135
VMSA-2018-0009 vRealize Automation updates address multiple security issues
                               13 April 2018

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           vRealize Automation
Publisher:         VMWare
Operating System:  Virtualisation
Impact/Access:     Cross-site Scripting -- Remote with User Interaction
                   Unauthorised Access  -- Remote/Unauthenticated      
Resolution:        Patch/Upgrade
CVE Names:         CVE-2018-6959 CVE-2018-6958 

Original Bulletin: 
   https://www.vmware.com/security/advisories/VMSA-2018-0009.html

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - ------------------------------------------------------------------------

                               VMware Security Advisory

Advisory ID: VMSA-2018-0009
Severity:    Important
Synopsis:    vRealize Automation updates address
             multiple security issues.
Issue date:  2018-04-12
Updated on:  2018-04-12 (Initial Advisory)
CVE number:  CVE-2018-6958, CVE-2018-6959

1. Summary

   vRealize Automation (vRA) updates address
   multiple security issues.

2. Relevant Products

   vRealize Automation (vRA)

3. Problem Description

   a. DOM-based cross-site scripting (XSS) vulnerability

   VMware vRealize Automation contains a vulnerability that may allow
   for a DOM-based cross-site scripting (XSS) attack. Exploitation of
   this issue may lead to the compromise of the vRA user's workstation.

   VMware would like to thank Oliver Matula and Benjamin Schwendemann
   of ERNW Enno Rey Netzwerke GmbH for reporting this issue to us.

   The Common Vulnerabilities and Exposures project (cve.mitre.org) has
   assigned the identifier CVE-2018-6958 to this issue.

   Column 5 of the following table lists the action required to
   remediate the vulnerability in each release, if a solution is
   available.

   VMware      Product    Running            Replace with/     Mitigation/
   Product     Version    on       Severity  Apply Patch       Workaround
   ==========  =========  =======  ========  ================  ==========
   vRA         7.3.x      VA        Important 7.3.1              None
   vRA         7.2.x      VA       Important 7.3.1              None
   vRA         7.1.x      VA        Important 7.3.1              None
   vRA         7.0.x      VA       Important 7.3.1              None
   vRA         6.2.x      VA       N/A       not affected       N/A


   b. Missing renewal of session tokens vulnerability

   VMware vRealize Automation contains a vulnerability in the handling
   of session IDs. Exploitation of this issue may lead to the hijacking
   of a valid vRA user's session.

   VMware would like to thank Oliver Matula and Benjamin Schwendemann
   of ERNW Enno Rey Netzwerke GmbH for reporting this issue to us.

   The Common Vulnerabilities and Exposures project (cve.mitre.org) has
   assigned the identifier CVE-2018-6959 to this issue.

   Column 5 of the following table lists the action required to
   remediate the vulnerability in each release, if a solution is
   available.

   VMware      Product    Running            Replace with/     Mitigation/
   Product     Version    on       Severity  Apply Patch       Workaround
   ==========  =========  =======  ========  ================  ==========
   vRA         7.3.x      VA        Moderate  7.4.0              None
   vRA         7.2.x      VA       Moderate  7.4.0              None
   vRA         7.1.x      VA        Moderate  7.4.0              None
   vRA         7.0.x      VA       Moderate  7.4.0              None
   vRA         6.2.x      VA       N/A       not affected       N/A


4. Solution

   Please review the patch/release notes for your product and version and
   verify the checksum of your downloaded file.

   vRealize Automation 7.3.1
   Downloads:
   https://my.vmware.com/web/vmware/info/slug/
   infrastructure_operations_management/vmware_vrealize_automation/7_3
   Documentation:
   https://docs.vmware.com/en/vRealize-Automation/index.html

   vRealize Automation 7.4.0
   Downloads:
   https://my.vmware.com/web/vmware/info/slug/
   infrastructure_operations_management/vmware_vrealize_automation/7_4
   Documentation:
   https://docs.vmware.com/en/vRealize-Automation/index.html


5. References

   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6958
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6959

- - -------------------------------------------------------------------------

6. Change log

   2018-04-12 VMSA-2018-0009
   Initial security advisory in conjunction with the release of
   vRealize Automation 7.4.0 on 2018-04-12

- - -------------------------------------------------------------------------
7. Contact

   E-mail list for product security notifications and announcements:
   http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce

   This Security Advisory is posted to the following lists:

     security-announce@lists.vmware.com
     bugtraq@securityfocus.com
     fulldisclosure@seclists.org

   E-mail: security@vmware.com
   PGP key at: https://kb.vmware.com/kb/1055

   VMware Security Advisories
   http://www.vmware.com/security/advisories

   VMware Security Response Policy
   https://www.vmware.com/support/policies/security_response.html

   VMware Lifecycle Support Phases
   https://www.vmware.com/support/policies/lifecycle.html

   VMware Security & Compliance Blog
   https://blogs.vmware.com/security

   Twitter
   https://twitter.com/VMwareSRC

   Copyright 2018 VMware Inc.  All rights reserved.

- -----BEGIN PGP SIGNATURE-----
Version: Encryption Desktop 10.4.1 (Build 490)
Charset: utf-8

wj8DBQFaz10uDEcm8Vbi9kMRAvTKAKD3Iwy3sJANhn+Sqf9TQJ0aYh31JQCgsYat
ElKsG4vJEpt+AhOtn8em1yU=
=n+Gt
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBWs/NFox+lLeg9Ub1AQhpWBAAmfQipbWoW+dvJr2+65boHanedbgferEv
LTV/2+rie1Ce/jk3rOJc+mqJ74RgRutab8mQNz2oqEMKQCFiqbKRl/Gqe8KwsolC
kVe4PpwXgPgVoXIXCRwT5XY7ryb/ekwARzDN6S37t4Q/lQYLE0Z5BbaowEnJVVGh
2J+EZKB8pGcL/qluyU+Du6mJAZdy1lGHxdR8aPvW32IBCq+RpiSaQZVDJ4dldzSh
54UehcUpI8byl6yANrct2sdajHjDHnlRmIRMaT2pQQxfjVDhalE4ay1NQIHkqGKD
RBNbQMA2sLLMumcJYJHKKBaFRMQTzHA+HPtKOC82Ncgv0FmItnMsv4ZLKCqUSHMk
4E2ntZPMnqJQWxFfF5AvhAIc7hfY8b++0Bd+/4ij3zD/vpitZ7XFB6dayD3yQv13
R+l/W1i1gmuWJGq+jZndmRhPpUsEfUJru14VubSEkayitKpnoGHNq0WiMzXLSaxY
V07w3viS6qeBXx1Ge2o2mqd4wK5L/pm1X1wduD+6X7hXfpfb9Ua4WaO2hHOD0BXt
2EpxS1jzB9j95dbqwuRD3MWu4rBGdb8nmO3r/S+gqfW/K/dn7/ZCAiGM/p318cY5
i8mfyqDBXnhEkfaJSsPpt1zBioNX1U44t+1T69i0upmsH1Aq92W2H0pWgQzw4bLK
niPCQW3rSz4=
=ZMWr
-----END PGP SIGNATURE-----

« Back to bulletins