VMware Security Advisory 2019-0004 - VMware vCloud Director for Service Providers update resolves a Remote Session Hijack vulnerability.
85cb5465c8927563ed06436a1dd5e042011b7033eb7f1a051de35e22a380d9d1
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- ------------------------------------------------------------------------
VMware Security Advisory
Advisory ID: VMSA-2019-0004
Severity: Critical
Synopsis: VMware vCloud Director for Service Providers update resolves
a Remote Session Hijack vulnerability
Issue date: 2019-03-28
Updated on: 2019-03-28 (Initial Advisory)
CVE numbers: CVE-2019-5523
1. Summary
VMware vCloud Director for Service Providers update resolves a Remote
Session Hijack vulnerability.
2. Relevant Products
VMware vCloud Director for Service Providers (vCD)
3. Problem Description
VMware vCloud Director for Service Providers update resolves a Remote
Session Hijack vulnerability in the Tenant and Provider Portals.
Successful exploitation of this issue may allow a malicious actor to
access the Tenant or Provider Portals by impersonating a currently
logged in session.
VMware would like to thank Tyler Flaagan, Eric Holm, Andrew Kramer,
and Logan Stratton of Dakota State University for reporting this issue
to us.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the identifier CVE-2019-5523 to this issue.
Column 5 of the following table lists the action required to mitigate
the vulnerability in each release, if a solution is available.
VMware Product Running Replace with/ Mitigation
Product Version on Severity Apply patch Workaround
========= ======= ======= ========= ============== ==========
vCD 9.7.x Any N/A Unaffected None
vCD 9.5.x Any Critical 9.5.0.3 None
vCD 9.1.x Any N/A Unaffected None
vCD 9.0.x Any N/A Unaffected None
4. Solution
Please review the patch/release notes for your product and version and
verify the checksum of your downloaded file.
VMware vCloud Director for Service Providers 9.5.0.3
Documentation and Downloads:
https://my.vmware.com/en/web/vmware/info/slug/datacenter_cloud_
infrastructure/vmware_vcloud_director/9_5
5. References
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5523
6. Change log
2019-03-28: VMSA-2019-0004
Initial security advisory in conjunction with the release of VMware
vCloud Director for Service Providers 9.5.0.3 on 2019-03-28.
7. Contact
E-mail list for product security notifications and announcements:
https://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce
This Security Advisory is posted to the following lists:
security-announce@lists.vmware.com
bugtraq@securityfocus.com
fulldisclosure@seclists.org
E-mail: security@vmware.com
PGP key at:https://kb.vmware.com/kb/1055
VMware Security Advisories
https://www.vmware.com/security/advisories
VMware Security Response Policy
https://www.vmware.com/support/policies/security_response.html
VMware Lifecycle Support Phases
https://www.vmware.com/support/policies/lifecycle.html
VMware Security & Compliance Blog
https://blogs.vmware.com/security
Twitter
https://twitter.com/VMwareSRC
Copyright 2019 VMware Inc. All rights reserved.
-----BEGIN PGP SIGNATURE-----
Version: Encryption Desktop 10.4.1 (Build 490)
Charset: utf-8
wj8DBQFcnZzJDEcm8Vbi9kMRAr5PAJ4w4ivvs+mgSno80favOSLC2x6pwQCeMLsg
jKAk1A+1DTrlPst7ZDLiq1Q=
=bi4+
-----END PGP SIGNATURE-----