CVE-2024-38814 (GCVE-0-2024-38814)
Vulnerability from cvelistv5 – Published: 2024-10-16 16:59 – Updated: 2024-10-16 17:53
VLAI?
Summary
An authenticated SQL injection vulnerability in VMware HCX was privately reported to VMware. A
malicious authenticated user with non-administrator privileges may be
able to enter specially crafted SQL queries and perform unauthorized
remote code execution on the HCX manager.
Updates are available to remediate this vulnerability in affected VMware products.
Severity ?
8.8 (High)
CWE
- CWE-89 - Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| N/A | VMware HCX |
Affected:
VMware HCX 4.8.0-4.8.2, VMware HCX 4.9.0-4.9.1, VMware HCX 4.10.0
|
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:a:vmware:vmware_hcx:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "vmware_hcx",
"vendor": "vmware",
"versions": [
{
"lessThanOrEqual": "4.8.2",
"status": "affected",
"version": "4.8.0",
"versionType": "custom"
},
{
"lessThanOrEqual": "4.9.1",
"status": "affected",
"version": "4.9.0",
"versionType": "custom"
},
{
"status": "affected",
"version": "4.10.0"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-38814",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-16T17:47:00.928170Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-16T17:53:24.283Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "VMware HCX",
"vendor": "N/A",
"versions": [
{
"status": "affected",
"version": "VMware HCX 4.8.0-4.8.2, VMware HCX 4.9.0-4.9.1, VMware HCX 4.10.0"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "An authenticated SQL injection vulnerability in VMware HCX was privately reported to VMware. A\n malicious authenticated user with non-administrator privileges may be \nable to enter specially crafted SQL queries and perform unauthorized \nremote code execution on the HCX manager.\u0026nbsp;\nUpdates are available to remediate this vulnerability in affected VMware products. \n\n\n\u003cstrong\u003e \u003c/strong\u003e\n\n\u003cbr\u003e"
}
],
"value": "An authenticated SQL injection vulnerability in VMware HCX was privately reported to VMware. A\n malicious authenticated user with non-administrator privileges may be \nable to enter specially crafted SQL queries and perform unauthorized \nremote code execution on the HCX manager.\u00a0\nUpdates are available to remediate this vulnerability in affected VMware products."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-89",
"description": "CWE-89 Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-10-16T16:59:20.174Z",
"orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d",
"shortName": "vmware"
},
"references": [
{
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25019"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d",
"assignerShortName": "vmware",
"cveId": "CVE-2024-38814",
"datePublished": "2024-10-16T16:59:20.174Z",
"dateReserved": "2024-06-19T22:31:57.187Z",
"dateUpdated": "2024-10-16T17:53:24.283Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:vmware:vmware_hcx:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"4.8.0\", \"versionEndIncluding\": \"4.8.2\", \"matchCriteriaId\": \"15F4C6D8-CF9F-4341-8315-0E4B38E641A8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:vmware:vmware_hcx:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"4.9.0\", \"versionEndIncluding\": \"4.9.1\", \"matchCriteriaId\": \"7DBB07C1-116E-4C35-9614-C8495BFCF894\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:vmware:vmware_hcx:4.10.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BAD018FC-6937-4DB3-9518-14B6D4A41C41\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"An authenticated SQL injection vulnerability in VMware HCX was privately reported to VMware. A\\n malicious authenticated user with non-administrator privileges may be \\nable to enter specially crafted SQL queries and perform unauthorized \\nremote code execution on the HCX manager.\\u00a0\\nUpdates are available to remediate this vulnerability in affected VMware products.\"}, {\"lang\": \"es\", \"value\": \"VMware recibi\\u00f3 un informe privado sobre una vulnerabilidad de inyecci\\u00f3n SQL autenticada en VMware HCX. Un usuario autenticado malintencionado con privilegios que no sean de administrador podr\\u00eda ingresar consultas SQL especialmente manipuladas y ejecutar c\\u00f3digo remoto no autorizado en el administrador HCX. Hay actualizaciones disponibles para solucionar esta vulnerabilidad en los productos VMware afectados.\"}]",
"id": "CVE-2024-38814",
"lastModified": "2024-10-21T18:20:53.267",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"security@vmware.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 8.8, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 5.9}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 8.8, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 5.9}]}",
"published": "2024-10-16T17:15:16.237",
"references": "[{\"url\": \"https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25019\", \"source\": \"security@vmware.com\", \"tags\": [\"Third Party Advisory\"]}]",
"sourceIdentifier": "security@vmware.com",
"vulnStatus": "Analyzed",
"weaknesses": "[{\"source\": \"security@vmware.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-89\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-89\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2024-38814\",\"sourceIdentifier\":\"security@vmware.com\",\"published\":\"2024-10-16T17:15:16.237\",\"lastModified\":\"2024-10-21T18:20:53.267\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An authenticated SQL injection vulnerability in VMware HCX was privately reported to VMware. A\\n malicious authenticated user with non-administrator privileges may be \\nable to enter specially crafted SQL queries and perform unauthorized \\nremote code execution on the HCX manager.\u00a0\\nUpdates are available to remediate this vulnerability in affected VMware products.\"},{\"lang\":\"es\",\"value\":\"VMware recibi\u00f3 un informe privado sobre una vulnerabilidad de inyecci\u00f3n SQL autenticada en VMware HCX. Un usuario autenticado malintencionado con privilegios que no sean de administrador podr\u00eda ingresar consultas SQL especialmente manipuladas y ejecutar c\u00f3digo remoto no autorizado en el administrador HCX. Hay actualizaciones disponibles para solucionar esta vulnerabilidad en los productos VMware afectados.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security@vmware.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"security@vmware.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-89\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-89\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vmware_hcx:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.8.0\",\"versionEndIncluding\":\"4.8.2\",\"matchCriteriaId\":\"15F4C6D8-CF9F-4341-8315-0E4B38E641A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vmware_hcx:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.9.0\",\"versionEndIncluding\":\"4.9.1\",\"matchCriteriaId\":\"7DBB07C1-116E-4C35-9614-C8495BFCF894\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vmware_hcx:4.10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BAD018FC-6937-4DB3-9518-14B6D4A41C41\"}]}]}],\"references\":[{\"url\":\"https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25019\",\"source\":\"security@vmware.com\",\"tags\":[\"Third Party Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-38814\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-10-16T17:47:00.928170Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:vmware:vmware_hcx:*:*:*:*:*:*:*:*\"], \"vendor\": \"vmware\", \"product\": \"vmware_hcx\", \"versions\": [{\"status\": \"affected\", \"version\": \"4.8.0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"4.8.2\"}, {\"status\": \"affected\", \"version\": \"4.9.0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"4.9.1\"}, {\"status\": \"affected\", \"version\": \"4.10.0\"}], \"defaultStatus\": \"unaffected\"}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-10-16T17:51:07.505Z\"}}], \"cna\": {\"source\": {\"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 8.8, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"HIGH\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"N/A\", \"product\": \"VMware HCX\", \"versions\": [{\"status\": \"affected\", \"version\": \"VMware HCX 4.8.0-4.8.2, VMware HCX 4.9.0-4.9.1, VMware HCX 4.10.0\"}], \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25019\"}], \"x_generator\": {\"engine\": \"Vulnogram 0.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"An authenticated SQL injection vulnerability in VMware HCX was privately reported to VMware. A\\n malicious authenticated user with non-administrator privileges may be \\nable to enter specially crafted SQL queries and perform unauthorized \\nremote code execution on the HCX manager.\\u00a0\\nUpdates are available to remediate this vulnerability in affected VMware products.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"An authenticated SQL injection vulnerability in VMware HCX was privately reported to VMware. A\\n malicious authenticated user with non-administrator privileges may be \\nable to enter specially crafted SQL queries and perform unauthorized \\nremote code execution on the HCX manager.\u0026nbsp;\\nUpdates are available to remediate this vulnerability in affected VMware products. \\n\\n\\n\u003cstrong\u003e \u003c/strong\u003e\\n\\n\u003cbr\u003e\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-89\", \"description\": \"CWE-89 Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)\"}]}], \"providerMetadata\": {\"orgId\": \"dcf2e128-44bd-42ed-91e8-88f912c1401d\", \"shortName\": \"vmware\", \"dateUpdated\": \"2024-10-16T16:59:20.174Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2024-38814\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-10-16T17:53:24.283Z\", \"dateReserved\": \"2024-06-19T22:31:57.187Z\", \"assignerOrgId\": \"dcf2e128-44bd-42ed-91e8-88f912c1401d\", \"datePublished\": \"2024-10-16T16:59:20.174Z\", \"assignerShortName\": \"vmware\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…