XML External Entity Vulnerability in Veeam ONE Software by Veeam
CVE-2020-15419

7.5HIGH

Key Information:

Vendor
Veeam
Status
Vendor
CVE Published:
28 July 2020

Summary

A vulnerability exists in the Veeam ONE software that allows remote attackers to disclose sensitive information without requiring authentication. The flaw is located in the Reporter_ImportLicense class, where improper handling of XML External Entity (XXE) references permits an attacker to parse a specially crafted document pointing to a URI. This results in the XML parser accessing the specified URI and potentially embedding confidential file contents back into the XML document. Consequently, an attacker can exploit this flaw to gain unauthorized access to system-level file contents.

Affected Version(s)

ONE 10.0.0.750_20200415

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

rgod
.