VMware View Planner 4.x prior to 4.6 Security Patch 1 contains a remote code execution vulnerability. Improper input validation and lack of authorization leading to arbitrary file upload in logupload web application. An unauthorized attacker with network access to View Planner Harness could upload and execute a specially crafted file leading to remote code execution within the logupload container.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
https://www.vmware.com/security/advisories/VMSA-2021-0003.html | vendor advisory |
http://packetstormsecurity.com/files/161879/VMware-View-Planner-4.6-Remote-Code-Execution.html | exploit vdb entry third party advisory |