Description
VMware Cloud Director 10.0.x before 10.0.0.2, 9.7.0.x before 9.7.0.5, 9.5.0.x before 9.5.0.6, and 9.1.0.x before 9.1.0.4 do not properly handle input leading to a code injection vulnerability. An authenticated actor may be able to send malicious traffic to VMware Cloud Director which may lead to arbitrary remote code execution. This vulnerability can be exploited through the HTML5- and Flex-based UIs, the API Explorer interface and API access.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
References
History
No history.
Status: PUBLISHED
Assigner: vmware
Published:
Updated: 2024-08-04T07:52:20.437Z
Reserved: 2019-12-30T00:00:00.000Z
Link: CVE-2020-3956
No data.
Status : Modified
Published: 2020-05-20T14:15:11.610
Modified: 2024-11-21T05:32:02.017
Link: CVE-2020-3956
No data.
OpenCVE Enrichment
No data.
Weaknesses