First published: Tue Jul 28 2020(Updated: )
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Veeam ONE 10.0.0.750_20200415. Authentication is not required to exploit this vulnerability. The specific flaw exists within the Reporter_ImportLicense class. Due to the improper restriction of XML External Entity (XXE) references, a specially crafted document specifying a URI causes the XML parser to access the URI and embed the contents back into the XML document for further processing. An attacker can leverage this vulnerability to disclose file contents in the context of SYSTEM. Was ZDI-CAN-10710.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Veeam ONE | ||
Veeam One Firmware | <9.5.4.4587 | |
Veeam One Firmware | >=10.0.0.0<10.0.0.750 | |
Veeam ONE |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-15419 is a vulnerability that allows remote attackers to disclose sensitive information on affected installations of Veeam ONE 10.0.0.750_20200415.
This vulnerability can be exploited by remote attackers without authentication.
Veeam ONE versions up to and including 10.0.0.750_20200415 are affected by this vulnerability.
The severity level of CVE-2020-15419 is high, with a CVSS score of 7.5.
To fix this vulnerability, it is recommended to upgrade Veeam ONE to a version higher than 10.0.0.750_20200415.