
=====================================================================

                             CERT-Renater

                 Note d'Information No. 2021/VULN531
_____________________________________________________________________

DATE                : 13/10/2021

HARDWARE PLATFORM(S): /

OPERATING SYSTEM(S): Systems running VMware vRealize Orchestrator
                                versions prior to 8.6.

=====================================================================
https://www.vmware.com/security/advisories/VMSA-2021-0023.html
_____________________________________________________________________

Moderate


Advisory ID:       VMSA-2021-0023
CVSSv3 Range:      6.5
Issue Date:        2021-10-12
Updated On:        2021-10-12 (Initial Advisory)
CVE(s):            CVE-2021-22036


Synopsis:
VMware vRealize Orchestrator update addresses open redirect
vulnerability (CVE-2021-22036)


1. Impacted Products

    VMware vRealize Orchestrator

2. Introduction

An open redirect vulnerability in VMware vRealize Orchestrator was
privately reported to VMware. Updates are available to remediate this
vulnerability in affected VMware products.

3. VMware vRealize Orchestrator update addresses open redirect
vulnerability (CVE-2021-22036)

Description

VMware vRealize Orchestrator contains an open redirect vulnerability due
to improper path handling. VMware has evaluated the severity of this
issue to be in the Moderate severity range with a maximum CVSSv3 base
score of 6.5.


Known Attack Vectors

A malicious actor may be able to redirect victim to an attacker
controlled domain due to improper path handling in vRealize Orchestrator
leading to sensitive information disclosure.

Resolution

To remediate CVE-2021-22036 apply the patches listed in the 'Fixed
Version' column of the 'Response Matrix' found below.


Workarounds

None.


Additional Documentation

None.


Notes

None.


Acknowledgements

VMware would like to thank Marek Takáč of Citadelo for reporting this
vulnerability to us.


Response Matrix

Product 	Version 	Running On 	CVE Identifier 	CVSSv3 	Severity 	Fixed
Version 	Workarounds 	Additional Documentation

VMware vRealize Orchestrator   8.x   Virtual Appliance    CVE-2021-22036
6.5    moderate    8.6    None    None


4. References

Fixed Version(s) and Release Notes:

VMware vRealize Orchestrator 8.6.0

Downloads and Documentation:

https://customerconnect.vmware.com/downloads/details?downloadGroup=VROVA-860&productId=1206&rPId=75321

https://docs.vmware.com/en/vRealize-Orchestrator/8.6/rn/VMware-vRealize-Orchestrator-86-Release-Notes.html


Mitre CVE Dictionary Links:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22036


FIRST CVSSv3 Calculator:
CVE-2021-22036:
https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N


5. Change Log

2021-10-12 VMSA-2021-0023
Initial security advisory.


6. Contact

E-mail list for product security notifications and announcements:
https://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce



This Security Advisory is posted to the following lists:

security-announce@lists.vmware.com
bugtraq@securityfocus.com
fulldisclosure@seclists.org



E-mail: security@vmware.com

PGP key at:
https://kb.vmware.com/kb/1055


VMware Security Advisories
https://www.vmware.com/security/advisories


VMware Security Response Policy
https://www.vmware.com/support/policies/security_response.html


VMware Lifecycle Support Phases
https://www.vmware.com/support/policies/lifecycle.html


VMware Security & Compliance Blog
https://blogs.vmware.com/security


Twitter
https://twitter.com/VMwareSRC



Copyright 2021 VMware Inc. All rights reserved.

=========================================================
+ CERT-RENATER       |    tel : 01-53-94-20-44          +
+ 23/25 Rue Daviel   |    fax : 01-53-94-20-41          +
+ 75013 Paris        |    email:cert@support.renater.fr +
=========================================================



