CVE-2020-15419

This vulnerability allows remote attackers to disclose sensitive information on affected installations of Veeam ONE 10.0.0.750_20200415. Authentication is not required to exploit this vulnerability. The specific flaw exists within the Reporter_ImportLicense class. Due to the improper restriction of XML External Entity (XXE) references, a specially crafted document specifying a URI causes the XML parser to access the URI and embed the contents back into the XML document for further processing. An attacker can leverage this vulnerability to disclose file contents in the context of SYSTEM. Was ZDI-CAN-10710.
References
Link Resource
https://www.veeam.com/kb3221 Vendor Advisory
https://www.zerodayinitiative.com/advisories/ZDI-20-822/ Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:o:veeam:one_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:veeam:one_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:veeam:one:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2020-07-28 18:15

Updated : 2024-02-04 21:00


NVD link : CVE-2020-15419

Mitre link : CVE-2020-15419

CVE.ORG link : CVE-2020-15419


JSON object : View

Products Affected

veeam

  • one
  • one_firmware
CWE
CWE-611

Improper Restriction of XML External Entity Reference