[Security-announce] New VMSA-2019-0004 - VMware vCloud Director for Service Providers update resolves a Remote Session Hijack vulnerability

VMware Security Announcements security-announce at lists.vmware.com
Thu Mar 28 21:20:08 PDT 2019


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
                        VMware Security Advisory

Advisory ID: VMSA-2019-0004
Severity: Critical
Synopsis: VMware vCloud Director for Service Providers update resolves
          a Remote Session Hijack vulnerability
Issue date: 2019-03-28
Updated on: 2019-03-28 (Initial Advisory)
CVE numbers: CVE-2019-5523

1. Summary
VMware vCloud Director for Service Providers update resolves a Remote
Session Hijack vulnerability.

2. Relevant Products
VMware vCloud Director for Service Providers (vCD)

3. Problem Description

VMware vCloud Director for Service Providers update resolves a Remote
Session Hijack vulnerability in the Tenant and Provider Portals.
Successful exploitation of this issue may allow a malicious actor to
access the Tenant or Provider Portals by impersonating a currently
logged in session.

VMware would like to thank Tyler Flaagan, Eric Holm, Andrew Kramer,
and Logan Stratton of Dakota State University for reporting this issue
to us.

The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the identifier CVE-2019-5523 to this issue.

Column 5 of the following table lists the action required to mitigate
the vulnerability in each release, if a solution is available.

  VMware    Product Running           Replace with/   Mitigation
  Product   Version on      Severity  Apply patch     Workaround
  ========= ======= ======= ========= ==============  ==========
     vCD     9.7.x      Any    N/A      Unaffected      None
     vCD     9.5.x      Any   Critical   9.5.0.3        None
     vCD     9.1.x      Any    N/A      Unaffected      None
     vCD     9.0.x      Any    N/A      Unaffected      None


4. Solution

Please review the patch/release notes for your product and version and
verify the checksum of your downloaded file.

VMware vCloud Director for Service Providers 9.5.0.3
Documentation and Downloads:
https://my.vmware.com/en/web/vmware/info/slug/datacenter_cloud_
infrastructure/vmware_vcloud_director/9_5

5. References

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5523


6. Change log

2019-03-28: VMSA-2019-0004

Initial security advisory in conjunction with the release of VMware
vCloud Director for Service Providers 9.5.0.3 on 2019-03-28.

7. Contact

E-mail list for product security notifications and announcements:
https://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce

This Security Advisory is posted to the following lists:

  security-announce at lists.vmware.com
  bugtraq at securityfocus.com
  fulldisclosure at seclists.org

E-mail: security at vmware.com
PGP key at:https://kb.vmware.com/kb/1055

VMware Security Advisories
https://www.vmware.com/security/advisories

VMware Security Response Policy
https://www.vmware.com/support/policies/security_response.html

VMware Lifecycle Support Phases
https://www.vmware.com/support/policies/lifecycle.html

VMware Security & Compliance Blog
https://blogs.vmware.com/security

Twitter
https://twitter.com/VMwareSRC

Copyright 2019 VMware Inc. All rights reserved.


-----BEGIN PGP SIGNATURE-----
Version: Encryption Desktop 10.4.1 (Build 490)
Charset: utf-8

wj8DBQFcnZzJDEcm8Vbi9kMRAr5PAJ4w4ivvs+mgSno80favOSLC2x6pwQCeMLsg
jKAk1A+1DTrlPst7ZDLiq1Q=
=bi4+
-----END PGP SIGNATURE-----


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.vmware.com/pipermail/security-announce/attachments/20190329/9b11f3db/attachment.html>


More information about the Security-announce mailing list