CVE-2022-22966
https://notcve.org/view.php?id=CVE-2022-22966
An authenticated, high privileged malicious actor with network access to the VMware Cloud Director tenant or provider may be able to exploit a remote code execution vulnerability to gain access to the server. Un actor malicioso autenticado muy privilegiado con acceso a la red del inquilino o proveedor de VMware Cloud Director puede ser capaz de explotar una vulnerabilidad de ejecución de código remota para obtener acceso al servidor • https://github.com/bb33bb/CVE-2022-22966 https://www.vmware.com/security/advisories/VMSA-2022-0013.html •
CVE-2020-3956 – vCloud Director 9.7.0.15498291 - Remote Code Execution
https://notcve.org/view.php?id=CVE-2020-3956
VMware Cloud Director 10.0.x before 10.0.0.2, 9.7.0.x before 9.7.0.5, 9.5.0.x before 9.5.0.6, and 9.1.0.x before 9.1.0.4 do not properly handle input leading to a code injection vulnerability. An authenticated actor may be able to send malicious traffic to VMware Cloud Director which may lead to arbitrary remote code execution. This vulnerability can be exploited through the HTML5- and Flex-based UIs, the API Explorer interface and API access. VMware Cloud Director versiones 10.0.x anteriores a 10.0.0.2, versiones 9.7.0.x anteriores a 9.7.0.5, versiones 9.5.0.x anteriores a 9.5.0.6 y versiones 9.1.0.x anteriores a 9.1.0.4, no manejan apropiadamente la entrada conllevando a una vulnerabilidad de inyección de código. Un actor autenticado puede ser capaz de enviar tráfico malicioso a VMware Cloud Director, lo que puede conllevar a una ejecución de código remota arbitraria. • https://www.exploit-db.com/exploits/48540 https://github.com/aaronsvk/CVE-2020-3956 http://packetstormsecurity.com/files/157909/vCloud-Director-9.7.0.15498291-Remote-Code-Execution.html https://citadelo.com/en/blog/full-infrastructure-takeover-of-vmware-cloud-director-CVE-2020-3956 https://www.vmware.com/security/advisories/VMSA-2020-0010.html • CWE-917: Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection') •
CVE-2019-5523
https://notcve.org/view.php?id=CVE-2019-5523
VMware vCloud Director for Service Providers 9.5.x prior to 9.5.0.3 update resolves a Remote Session Hijack vulnerability in the Tenant and Provider Portals. Successful exploitation of this issue may allow a malicious actor to access the Tenant or Provider Portals by impersonating a currently logged in session. VMware vCloud Director para proveedores de servicio, en versiones desde las 9.5.x hasta la actualización de 9.5.0.3, resuelve una vulnerabilidad de secuestro de sesión remoto en los portales del tenant y provider. La explotación con éxito de este fallo podría permitir a un actor malicioso acceder a los portales del tenant o del provider, suplantando una sesión ya iniciada • http://packetstormsecurity.com/files/152289/VMware-Security-Advisory-2019-0004.html http://www.securityfocus.com/bid/107638 https://www.vmware.com/security/advisories/VMSA-2019-0004.html • CWE-384: Session Fixation •
CVE-2016-2076
https://notcve.org/view.php?id=CVE-2016-2076
Client Integration Plugin (CIP) in VMware vCenter Server 5.5 U3a, U3b, and U3c and 6.0 before U2; vCloud Director 5.5.5; and vRealize Automation Identity Appliance 6.2.4 before 6.2.4.1 mishandles session content, which allows remote attackers to hijack sessions via a crafted web site. Client Integration Plugin (CIP) en VMware vCenter Server 5.5 U3a, U3b y U3c y 6.0 en versiones anteriores a U2; vCloud Director 5.5.5; y vRealize Automation Identity Appliance 6.2.4 en versiones anteriores a 6.2.4.1 no maneja adecuadamente el contenido de sesión, lo que permite a atacantes remotos secuestrar sesiones a través de un sitio web manipulado. • http://www.securitytracker.com/id/1035570 http://www.securitytracker.com/id/1035571 http://www.securitytracker.com/id/1035572 http://www.vmware.com/security/advisories/VMSA-2016-0004.html • CWE-287: Improper Authentication •
CVE-2014-1211
https://notcve.org/view.php?id=CVE-2014-1211
Cross-site request forgery (CSRF) vulnerability in VMware vCloud Director 5.1.x before 5.1.3 allows remote attackers to hijack the authentication of arbitrary users for requests that trigger a logout. Vulnerabilidad cross-site request forgery (CSRF) en VMware vCloud Director 5.1.x anteriores a 5.1.3 permite a atacantes remotos secuestrar la autenticación de usuarios de forma arbitraria para peticiones que desencadenan un logout. • http://osvdb.org/102198 http://www.securityfocus.com/bid/64993 http://www.securitytracker.com/id/1029645 http://www.vmware.com/security/advisories/VMSA-2014-0001.html https://exchange.xforce.ibmcloud.com/vulnerabilities/90560 • CWE-352: Cross-Site Request Forgery (CSRF) •