...
BugZero found this defect 1557 days ago.
XML External Entity Processing vulnerabilities in Veeam ONE Reporter make possible to read arbitrary files without authentication. Severity: critical CVSS v3 score: 7.5
Veeam ONE Reporter uses XML files for importing and exporting report templates. A remote attacker may send malicious data in the HTTP request to the Veeam ONE Reporter web server (default port 1239). The request will be parsed due to lack of XML input validation. The exploitation of the vulnerabilities may lead to the disclosure of confidential data. These vulnerabilities are tracked as ZDI-CAN-10709 (CVE-2020-15418) and ZDI-CAN-10710 (CVE-2020-15419).
Hotfixes available for the following versions of Veeam ONE: 10 (build 10.0.0.750) 9.5 Update 4a (build 9.5.4.4587) NOTE: These hotfixes are not compatible with version 9.5 Update 4 (build 9.5.4.4566). Customers running this version are advised to upgrade to version 10 or 9.5 Update 4a and then apply the hotfixes. The hotfixes must be installed on the Veeam ONE server.
These vulnerabilities were discovered by: rgod working with Trend Micro Zero Day Initiative DOWNLOAD HOTFIX FOR VEEAM ONE 10 MD5: e718428479bfbdade3a007c993db3e7d SHA-1: a75e610a54105282e2ae4770843f53989531410e DOWNLOAD HOTFIX FOR VEEAM ONE 9.5 U4A MD5: cd245dc3e797c4d1ec46e4494a84a5fb SHA-1: 3d3b2b9bdfe6310a4cf72fe9fc041ba58f4b0bca