VMware this week announced the availability of a security patch for VMware View Planner, to address a vulnerability leading to remote code execution.
The benchmarking tool provides consistent methodology for the comparison of virtual desktop deployment platforms, measuring both the performance of application operations and the scalability of the deployment platform.
With the release of View Planner 4.6 Security Patch 1 on March 2, VMware fixes CVE-2021-21978, an issue that could allow an attacker to execute code remotely. The bug features a CVSS score of 8.6.
In its advisory, VMware explains that the bug is, in fact, rooted in improper input validation, complemented by lack of authorization.
Together, these issues could be abused for the upload of arbitrary files in the logupload web application, which could then lead to code execution.
According to the company, an attacker looking to exploit this bug needs to have already compromised the network in order to access View Planner Harness.
The attacker could then abuse the vulnerability to upload a specially crafted file and then execute it, which would essentially result in the execution of code remotely, within the logupload container.
The company also notes that it considers the vulnerability “to be in the Important severity range,” and that the bug was privately reported.
VMware recommends that all affected customers apply the security patch that was released this week, to ensure they are protected.
The issue was reported by Mikhail Klyuchnikov, a researcher with Positive Technologies. VMware makes no mention of the vulnerability being exploited in the wild.
Related: Hackers Scanning for VMware vCenter Servers Affected by Critical Vulnerability
Related: Vulnerability in VMware vSphere Replication Can Facilitate Attacks on Enterprises
Related: Hackers Can Compromise VMware vCenter Server Via Newly Patched Flaw

More from Ionut Arghire
- Ransomware Gang Publishes Data Allegedly Stolen From Maritime Firm Royal Dirkzwager
- Zoom Paid Out $3.9 Million in Bug Bounties in 2022
- Malicious NuGet Packages Used to Target .NET Developers
- Google Pixel Vulnerability Allows Recovery of Cropped Screenshots
- Millions Stolen in Hack at Cryptocurrency ATM Manufacturer General Bytes
- NBA Notifying Individuals of Data Breach at Mailing Services Provider
- Adobe Acrobat Sign Abused to Distribute Malware
- Latitude Financial Services Data Breach Impacts 300,000 Customers
Latest News
- Google Suspends Chinese Shopping App Amid Security Concerns
- Verosint Launches Account Fraud Detection and Prevention Platform
- Ransomware Gang Publishes Data Allegedly Stolen From Maritime Firm Royal Dirkzwager
- Zoom Paid Out $3.9 Million in Bug Bounties in 2022
- Oleria Scores $8M Seed Funding for ID Authentication Technology
- Exploitation of 55 Zero-Day Vulnerabilities Came to Light in 2022: Mandiant
- News Analysis: UK Commits $3 Billion to Support National Quantum Strategy
- Malicious NuGet Packages Used to Target .NET Developers
