First published: Wed Jul 08 2020(Updated: )
The VeloCloud Orchestrator does not apply correct input validation which allows for blind SQL-injection. A malicious actor with tenant access to Velocloud Orchestrator could enter specially crafted SQL queries and obtain data to which they are not privileged.
Credit: security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
VMware VeloCloud Orchestrator | >=3.1.1<3.3.2 | |
VMware VeloCloud Orchestrator | =3.3.2 | |
VMware VeloCloud Orchestrator | =3.4.0 | |
Linux kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-3973 has been rated as critical due to the potential for blind SQL injection leading to unauthorized data access.
To remediate CVE-2020-3973, upgrade VMware VeloCloud Orchestrator to version 3.4.0 or later.
CVE-2020-3973 affects users with tenant access to VMware VeloCloud Orchestrator versions 3.1.1 to 3.3.2.
CVE-2020-3973 enables blind SQL injection attacks that can expose sensitive data.
CVE-2020-3973 affects VMware VeloCloud Orchestrator and is independent of the underlying Linux operating system.