First published: Tue Jul 28 2020(Updated: )
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Veeam ONE 10.0.0.750_20200415. Authentication is not required to exploit this vulnerability. The specific flaw exists within the SSRSReport class. Due to the improper restriction of XML External Entity (XXE) references, a specially crafted document specifying a URI causes the XML parser to access the URI and embed the contents back into the XML document for further processing. An attacker can leverage this vulnerability to disclose file contents in the context of SYSTEM. Was ZDI-CAN-10709.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Veeam ONE | ||
Veeam One Firmware | <9.5.4.4587 | |
Veeam One Firmware | >=10.0.0.0<10.0.0.750 | |
Veeam ONE |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-15418 is a vulnerability in Veeam ONE that allows remote attackers to disclose sensitive information.
CVE-2020-15418 affects Veeam ONE version 10.0.0.750 and earlier.
No, authentication is not required to exploit CVE-2020-15418.
CVE-2020-15418 has a severity rating of 7.5 (High).
To fix CVE-2020-15418, it is recommended to update to Veeam ONE version 10.0.0.751 or later.