First published: Thu Dec 29 2016(Updated: )
The Suite REST API in VMware vRealize Operations (aka vROps) 6.x before 6.4.0 allows remote authenticated users to write arbitrary content to files or rename files via a crafted DiskFileItem in a relay-request payload that is mishandled during deserialization.
Credit: security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
VMware vRealize Operations | =6.0.0 | |
VMware vRealize Operations | =6.1.0 | |
VMware vRealize Operations | =6.2.0a | |
VMware vRealize Operations | =6.2.1 | |
VMware vRealize Operations | =6.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-7462 has a moderate severity level due to its potential for unauthorized file write operations.
To fix CVE-2016-7462, upgrade VMware vRealize Operations to version 6.4.0 or higher.
CVE-2016-7462 affects remote authenticated users of VMware vRealize Operations versions 6.0.0 through 6.3.0.
CVE-2016-7462 facilitates arbitrary file write and file renaming attacks through deserialization issues.
Yes, CVE-2016-7462 requires remote authenticated access to exploit the vulnerability.