
====================================================================

                             CERT-Renater

                 Note d'Information No. 2021/VULN128
_____________________________________________________________________

DATE                : 03/03/2021

HARDWARE PLATFORM(S): /

OPERATING SYSTEM(S): Systems running VMware View Planner versions prior
                                  to 4.6 Security Patch 1.

=====================================================================
https://www.vmware.com/security/advisories/VMSA-2021-0003.html
_____________________________________________________________________


Advisory ID:     VMSA-2021-0003
CVSSv3 Range:    8.6
Issue Date:      2021-03-02
Updated On:      2021-03-02 (Initial Advisory)
CVE(s):          CVE-2021-21978


Synopsis:
VMware View Planner update addresses remote code execution vulnerability
(CVE-2021-21978)


1. Impacted Products

    VMware View Planner

2. Introduction

A vulnerability in VMware View Planner was privately reported to VMware.
An update is available to remediate this vulnerability in affected
VMware products.


3. Advisory Details

Description

VMware View Planner contains a remote code execution vulnerability.
VMware has evaluated the severity of this issue to be in the Important
severity range with a maximum CVSSv3 base score of 8.6.

Known Attack Vectors

Improper input validation and lack of authorization leading to arbitrary
file upload in logupload web application. An unauthorized attacker with
network access to View Planner Harness could upload and execute a
specially crafted file leading to remote code execution within the
logupload container.


Resolution

To remediate CVE-2021-21978 apply the updates listed in the 'Fixed
Version' column of the 'Response Matrix' below to affected deployments.


Workarounds

None.


Additional Documentation

None.


Notes

None.


Acknowledgements

VMware would like to thank Mikhail Klyuchnikov of Positive Technologies
for reporting this issue to us.


Response Matrix
Product 	Version 	Running On 	CVE Identifier 	CVSSv3 	Severity 	Fixed
Version 	Workarounds 	Additional Documentation

VMware View Planner    4.6    Any    CVE-2021-21978    8.6    important
	View Planner 4.6 Security Patch 1    None     None


4. References

VMware View Planner 4.6 Security Patch 1
Download:
https://my.vmware.com/web/vmware/downloads/details?downloadGroup=VIEW-PLAN-460&productId=1067&rPId=53394
Release Notes:
https://docs.vmware.com/en/VMware-View-Planner/4.6/rn/VMware-View-Planner-46-Release-Notes.html
Documentation:
https://docs.vmware.com/en/VMware-View-Planner/4.6/user-guide/GUID-7B89FA3E-6553-4756-81E0-EF8BE93F5F9C.html



Mitre CVE Dictionary Links:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21978



FIRST CVSSv3 Calculator:

CVE-2021-21978:
https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L


5. Change Log

2021-03-02 VMSA-2021-0003
Initial security advisory.


6. Contact

E-mail list for product security notifications and announcements:
https://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce



This Security Advisory is posted to the following lists:

security-announce@lists.vmware.com
bugtraq@securityfocus.com
fulldisclosure@seclists.org



E-mail: security@vmware.com

PGP key at:
https://kb.vmware.com/kb/1055



VMware Security Advisories
https://www.vmware.com/security/advisories



VMware Security Response Policy
https://www.vmware.com/support/policies/security_response.html



VMware Lifecycle Support Phases
https://www.vmware.com/support/policies/lifecycle.html



VMware Security & Compliance Blog
https://blogs.vmware.com/security



Twitter
https://twitter.com/VMwareSRC



Copyright 2021 VMware Inc. All rights reserved.


=========================================================
+ CERT-RENATER       |    tel : 01-53-94-20-44          +
+ 23/25 Rue Daviel   |    fax : 01-53-94-20-41          +
+ 75013 Paris        |    email:cert@support.renater.fr +
=========================================================



