### [CVE-2019-5523](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5523) ![](https://img.shields.io/static/v1?label=Product&message=VMware%20vCloud%20Director%20for%20Service%20Providers%20(vCD)&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Remote%20Session%20Hijack%20vulnerability&color=brighgreen) ### Description VMware vCloud Director for Service Providers 9.5.x prior to 9.5.0.3 update resolves a Remote Session Hijack vulnerability in the Tenant and Provider Portals. Successful exploitation of this issue may allow a malicious actor to access the Tenant or Provider Portals by impersonating a currently logged in session. ### POC #### Reference - http://packetstormsecurity.com/files/152289/VMware-Security-Advisory-2019-0004.html #### Github - https://github.com/ARPSyndicate/cvemon