Veeam ONE XML External Entity Processing vulnerabilities

KB ID:
3221
Product:
Veeam ONE
Version:
9.5 U4, 9.5 U4a, 10
Published:
Last Modified:
2020-07-08

Challenge

XML External Entity Processing vulnerabilities in Veeam ONE Reporter make possible to read arbitrary files without authentication.
Severity: critical
CVSS v3 score: 7.5

Cause

Veeam ONE Reporter uses XML files for importing and exporting report templates. A remote attacker may send malicious data in the HTTP request to the Veeam ONE Reporter web server (default port 1239). The request will be parsed due to lack of XML input validation. The exploitation of the vulnerabilities may lead to the disclosure of confidential data. These vulnerabilities are tracked as ZDI-CAN-10709 (CVE-2020-15418) and ZDI-CAN-10710 (CVE-2020-15419).

Solution

Hotfixes available for the following versions of Veeam ONE: 

  • 10 (build 10.0.0.750)
  • 9.5 Update 4a (build 9.5.4.4587)
NOTE: These hotfixes are not compatible with version 9.5 Update 4 (build 9.5.4.4566). Customers running this version are advised to upgrade to version 10 or 9.5 Update 4a and then apply the hotfixes.

The hotfixes must be installed on the Veeam ONE server.

More Information

These vulnerabilities were discovered by: 
rgod working with Trend Micro Zero Day Initiative

[[DOWNLOAD|DOWNLOAD HOTFIX FOR VEEAM ONE 10|https://www.veeam.com/download_add_packs/virtualization-management-one-solution/10.0.0.750_KB3221/]]
MD5: e718428479bfbdade3a007c993db3e7d
SHA-1: a75e610a54105282e2ae4770843f53989531410e

[[DOWNLOAD|DOWNLOAD HOTFIX FOR VEEAM ONE 9.5 U4A|https://www.veeam.com/download_add_packs/virtualization-management-one-solution/9.5.4.4587_KB3221/]]
MD5: cd245dc3e797c4d1ec46e4494a84a5fb
SHA-1: 3d3b2b9bdfe6310a4cf72fe9fc041ba58f4b0bca

Please be aware that we’re making changes which will restrict access to product updates for users without an active contract.

OK

Rate the quality of this KB article: 
5 out of 5 based on 4 ratings

Couldn't find what you were looking for?

Below you can submit an idea for a new knowledge base article.

Report a typo on this page:

Please select a spelling error or a typo on this page with your mouse and press CTRL + Enter to report this mistake to us. Thank you!

Spelling error in text:

Submit