First published: Thu Jul 11 2024(Updated: )
VMware Aria Automation does not apply correct input validation which allows for SQL-injection in the product. An authenticated malicious user could enter specially crafted SQL queries and perform unauthorised read/write operations in the database.
Credit: security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
VMware Aria Automation | <8.17.0 | |
VMware Cloud Foundation | >=4.0<=5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-22280 has been classified as a high-severity vulnerability due to its potential for SQL injection and unauthorized database access.
To fix CVE-2024-22280, it is recommended to update VMware Aria Automation and VMware Cloud Foundation to the latest patched versions.
CVE-2024-22280 affects users of VMware Aria Automation versions prior to 8.17.0 and VMware Cloud Foundation versions between 4.0 and 5.0.
An attacker exploiting CVE-2024-22280 can perform unauthorized read and write operations on the database through crafted SQL queries.
Yes, exploitation of CVE-2024-22280 requires authentication, so only authenticated users can carry out the attack.