Challenge
XML External Entity Processing vulnerabilities in Veeam ONE Reporter make possible to read arbitrary files without authentication.
Severity: critical
CVSS v3 score: 7.5
Cause
Veeam ONE Reporter uses XML files for importing and exporting report templates. A remote attacker may send malicious data in the HTTP request to the Veeam ONE Reporter web server (default port 1239). The request will be parsed due to lack of XML input validation. The exploitation of the vulnerabilities may lead to the disclosure of confidential data. These vulnerabilities are tracked as ZDI-CAN-10709 (CVE-2020-15418) and ZDI-CAN-10710 (CVE-2020-15419).
Solution
Hotfixes available for the following versions of Veeam ONE:
10 (build 10.0.0.750)
9.5 Update 4a (build 9.5.4.4587)
NOTE: These hotfixes are not compatible with version 9.5 Update 4 (build 9.5.4.4566). Customers running this version are advised to upgrade to version 10 or 9.5 Update 4a and then apply the hotfixes.
The hotfixes must be installed on the Veeam ONE server.
More Information
These vulnerabilities were discovered by:
rgod working with Trend Micro Zero Day Initiative
DOWNLOAD HOTFIX FOR VEEAM ONE 10
MD5: e718428479bfbdade3a007c993db3e7d
SHA-1: a75e610a54105282e2ae4770843f53989531410e
DOWNLOAD HOTFIX FOR VEEAM ONE 9.5 U4A
MD5: cd245dc3e797c4d1ec46e4494a84a5fb
SHA-1: 3d3b2b9bdfe6310a4cf72fe9fc041ba58f4b0bca