XML External Entity Processing vulnerabilities in Veeam ONE Reporter make possible to read arbitrary files without authentication.
CVSS v3 score: 7.5
Veeam ONE Reporter uses XML files for importing and exporting report templates. A remote attacker may send malicious data in the HTTP request to the Veeam ONE Reporter web server (default port 1239). The request will be parsed due to lack of XML input validation. The exploitation of the vulnerabilities may lead to the disclosure of confidential data. These vulnerabilities are tracked as ZDI-CAN-10709 (CVE-2020-15418) and ZDI-CAN-10710 (CVE-2020-15419).
Hotfixes available for the following versions of Veeam ONE:
- 10 (build 10.0.0.750)
- 9.5 Update 4a (build 188.8.131.5287)
The hotfixes must be installed on the Veeam ONE server.
rgod working with Trend Micro Zero Day Initiative
[[DOWNLOAD|DOWNLOAD HOTFIX FOR VEEAM ONE 10|https://www.veeam.com/download_add_packs/virtualization-management-one-solution/10.0.0.750_KB3221/]]
[[DOWNLOAD|DOWNLOAD HOTFIX FOR VEEAM ONE 9.5 U4A|https://www.veeam.com/download_add_packs/virtualization-management-one-solution/184.108.40.20687_KB3221/]]
Please be aware that we’re making changes which will restrict access to product updates for users without an active contract.