VMware vCloud Director for Service Providers 9.5.x prior to 9.5.0.3 update resolves a Remote Session Hijack vulnerability in the Tenant and Provider Portals. Successful exploitation of this issue may allow a malicious actor to access the Tenant or Provider Portals by impersonating a currently logged in session.
Authenticating a user, or otherwise establishing a new user session, without invalidating any existing session identifier gives an attacker the opportunity to steal authenticated sessions.
Link | Tags |
---|---|
http://packetstormsecurity.com/files/152289/VMware-Security-Advisory-2019-0004.html | vdb entry third party advisory |
http://www.securityfocus.com/bid/107638 | vdb entry third party advisory |
https://www.vmware.com/security/advisories/VMSA-2019-0004.html | vendor advisory |