René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

347 lines
13 KiB
JSON

{
"id": "CVE-2019-5532",
"sourceIdentifier": "security@vmware.com",
"published": "2019-09-18T21:15:13.313",
"lastModified": "2022-04-22T19:30:36.723",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "VMware vCenter Server (6.7.x prior to 6.7 U3, 6.5 prior to 6.5 U3 and 6.0 prior to 6.0 U3j) contains an information disclosure vulnerability due to the logging of credentials in plain-text for virtual machines deployed through OVF. A malicious user with access to the log files containing vCenter OVF-properties of a virtual machine deployed from an OVF may be able to view the credentials used to deploy the OVF (typically the root account of the virtual machine)."
},
{
"lang": "es",
"value": "VMware vCenter Server (versi\u00f3n 6.7.x anterior a 6.7 U3, versi\u00f3n 6.5 anterior a 6.5 U3 y versi\u00f3n 6.0 anterior a 6.0 U3j), contiene una vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n debido al registro de credenciales en texto plano para m\u00e1quinas virtuales implementadas por medio de OVF. Un usuario malicioso con acceso a los archivos de registro que contienen propiedades OVF de vCenter de una m\u00e1quina virtual implementada desde un OVF puede ser capaz de visualizar las credenciales usadas para implementar el OVF (com\u00fanmente la cuenta root de la m\u00e1quina virtual)."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.7,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.1,
"impactScore": 4.0
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-532"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7499E57A-1F9C-45F0-93F8-F3FB7B0F990F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:6.0:a:*:*:*:*:*:*",
"matchCriteriaId": "74EE8EE5-54F0-4359-898B-C57C5B2AE7C4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:6.0:b:*:*:*:*:*:*",
"matchCriteriaId": "F83AAB8E-F129-4D1C-A4BC-4CC2C1777F5F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:6.0:u1:*:*:*:*:*:*",
"matchCriteriaId": "C914E1AB-DF4F-4A68-8893-EDA57E048147"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:6.0:u1b:*:*:*:*:*:*",
"matchCriteriaId": "7ECFC0C8-C8EC-4E44-9E90-5D4C67B5F339"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:6.0:u3:*:*:*:*:*:*",
"matchCriteriaId": "7E2BAD93-38DE-4C23-8953-4E199996537B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:6.0:update2:*:*:*:*:*:*",
"matchCriteriaId": "8838067B-0AB5-4C6A-B201-73C193FEFA92"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:6.0:update2a:*:*:*:*:*:*",
"matchCriteriaId": "34EDDB03-6DA9-48FE-B7F2-FBBCDF5D8385"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:6.0:update2m:*:*:*:*:*:*",
"matchCriteriaId": "2E8C89BF-93F3-419A-83B7-B617A3DF31D7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:6.0:update3a:*:*:*:*:*:*",
"matchCriteriaId": "4E38D9BC-1BFA-45B5-AC25-A6DB3F025D88"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:6.0:update3b:*:*:*:*:*:*",
"matchCriteriaId": "3F803DFB-4172-4D60-94DE-F20370859617"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:6.0:update3c:*:*:*:*:*:*",
"matchCriteriaId": "F99ACFA4-3EEF-4151-80E9-701537DB8D99"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:6.0:update3d:*:*:*:*:*:*",
"matchCriteriaId": "C4591535-4081-4DF7-B115-53D1014C83CA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:6.0:update3e:*:*:*:*:*:*",
"matchCriteriaId": "22C17858-6EBB-4807-A230-3F53670A69FB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:6.0:update3f:*:*:*:*:*:*",
"matchCriteriaId": "77A98613-F61B-4801-840E-6F281A98B381"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:6.0:update3g:*:*:*:*:*:*",
"matchCriteriaId": "D0122FA8-0D5F-4296-B00B-9BA00CBAE64D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:6.0:update3h:*:*:*:*:*:*",
"matchCriteriaId": "76F6CA9D-16DB-450B-A226-93FC151AB631"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:6.0:update3i:*:*:*:*:*:*",
"matchCriteriaId": "D441FEB9-5773-4E20-9B3E-B6F634F773E9"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:6.7:*:*:*:*:*:*:*",
"matchCriteriaId": "EEF33103-ECDD-427B-A445-2D7F90202FCB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:6.7:a:*:*:*:*:*:*",
"matchCriteriaId": "5241C282-A02B-44B2-B6CA-BA3A99F9737C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:6.7:b:*:*:*:*:*:*",
"matchCriteriaId": "04A60AC7-C2EA-4DBF-9743-54D708584AFA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:6.7:c:*:*:*:*:*:*",
"matchCriteriaId": "445FA649-B7F4-4AE2-A487-57357AC95241"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:6.7:d:*:*:*:*:*:*",
"matchCriteriaId": "8A91B0C4-F184-459E-AFD3-DE0E351CC964"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:6.7:update1:*:*:*:*:*:*",
"matchCriteriaId": "23253631-2655-48A8-9B00-CB984232329C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:6.7:update1b:*:*:*:*:*:*",
"matchCriteriaId": "50C2A9A8-0E66-4702-BCD4-74622108E7A6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:6.7:update2:*:*:*:*:*:*",
"matchCriteriaId": "EE4D3E2A-C32D-408F-B811-EF8BC86F0D34"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:6.7:update2a:*:*:*:*:*:*",
"matchCriteriaId": "31CA7802-D78D-4BAD-A45A-68B601C010C6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:6.7:update2c:*:*:*:*:*:*",
"matchCriteriaId": "3B98981B-4721-4752-BAB4-361DB5AEB86F"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "3D97854C-DE5D-48B4-B5DB-C132E6D4B826"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:6.5:a:*:*:*:*:*:*",
"matchCriteriaId": "CF7DDB0C-3C07-4B5E-8B8A-0542FEE72877"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:6.5:b:*:*:*:*:*:*",
"matchCriteriaId": "1DD16169-A7DF-4604-888C-156A60018E32"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:6.5:c:*:*:*:*:*:*",
"matchCriteriaId": "46FC9F34-C8FA-4AFE-9F4A-7CF9516BD4D9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:6.5:d:*:*:*:*:*:*",
"matchCriteriaId": "D26534EB-327B-4ED6-A3E1-005552CB1F9D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:6.5:update1:*:*:*:*:*:*",
"matchCriteriaId": "7E51F433-1152-4E94-AF77-970230B1A574"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:6.5:update1b:*:*:*:*:*:*",
"matchCriteriaId": "0064D104-E0D8-481A-9029-D3726A1A9CF4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:6.5:update1c:*:*:*:*:*:*",
"matchCriteriaId": "9B4D3F61-6CD9-411F-A205-EB06A57EBB4E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:6.5:update1d:*:*:*:*:*:*",
"matchCriteriaId": "F72A1E9C-F960-4E8C-A46C-B38209E6349E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:6.5:update1e:*:*:*:*:*:*",
"matchCriteriaId": "2C33CE46-F529-4EA9-9344-6ED3BFA7019D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:6.5:update1g:*:*:*:*:*:*",
"matchCriteriaId": "9F1D8161-0E02-45C9-BF61-14799AB65E03"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:6.5:update2:*:*:*:*:*:*",
"matchCriteriaId": "1F2CB1FF-6118-4875-945D-07BAA3A21FFA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:6.5:update2b:*:*:*:*:*:*",
"matchCriteriaId": "1AEDA28A-5C8E-4E95-A377-3BE530DBEAB5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:6.5:update2c:*:*:*:*:*:*",
"matchCriteriaId": "BDDC6510-3116-4578-80C8-8EF044A8370A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:6.5:update2d:*:*:*:*:*:*",
"matchCriteriaId": "8678DB48-CB98-4E4C-ADE6-CABA73265FEC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:6.5:update2g:*:*:*:*:*:*",
"matchCriteriaId": "DBD9A341-1FBF-4E04-848B-550DEB27261A"
}
]
}
]
}
],
"references": [
{
"url": "http://packetstormsecurity.com/files/154536/VMware-Security-Advisory-2019-0013.html",
"source": "security@vmware.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.vmware.com/security/advisories/VMSA-2019-0013.html",
"source": "security@vmware.com",
"tags": [
"Vendor Advisory"
]
}
]
}