VMware has provided updates to correct two security vulnerabilities in vCenter Server and Cloud Foundation that could be exploited by a remote attacker to access sensitive information.
The most serious of the issues is an arbitrary file read vulnerability in the vSphere Web Client. Tracked as CVE-2021-21980, the bug was rated 7.5 out of a maximum of 10 on the CVSS scoring system and impacts vCenter Server versions 6.5 and 6.7.
“A malicious actor with network access to port 443 on vCenter Server can exploit this problem to gain access to sensitive information,” the company noted in a November 23 notice, attributing ch0wn of the Orz lab to report the problem. fault.
The second flaw that VMware fixes concerns a Server-Side Request Forgery (SSRF) vulnerability in the Virtual Storage Area Network (vSAN) web client plug-in that could allow a malicious actor with network access to port 443 on vCenter Server d ‘exploit the flaw by accessing an internal service or a URL request outside the server.
The company credited Qi’anxin Group Legendsec’s SGLAB’s magiczero with discovering and reporting the flaw.
SSRF attacks are a kind of web security vulnerability that allows an adversary to read or modify internal resources to which the target server has access by sending specially crafted HTTP requests, resulting in unauthorized exposure of information.
The risks from SSRF attacks are so severe and widespread that they have been included on the Open Web Application Security Project (OWASP) Top 10 Web Application Security Risks List for 2021.
With VMware virtualization solutions widely used in enterprises, it is no surprise that its products have become lucrative targets for malicious actors who launch various attacks against vulnerable networks. To mitigate the risk of infiltration, it is recommended that organizations act quickly to apply necessary updates.