{"id":16717,"date":"2021-07-07T12:02:34","date_gmt":"2021-07-07T10:02:34","guid":{"rendered":"https:\/\/herolab-usd.formwandler.rocks\/security-advisories\/usd-2021-0008\/"},"modified":"2022-04-20T15:34:29","modified_gmt":"2022-04-20T13:34:29","slug":"usd-2021-0008","status":"publish","type":"page","link":"https:\/\/herolab.usd.de\/en\/security-advisories\/usd-2021-0008\/","title":{"rendered":"usd-2021-0008"},"content":{"rendered":"\n[et_pb_section fb_built=\"1\" _builder_version=\"4.17.1\" _module_preset=\"default\" background_color=\"#2E353D\" custom_padding=\"||0px|||\" global_colors_info=\"{}\"][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.17.1\" _module_preset=\"cc5ac6f4-ebbd-4b3f-bc92-4dfc1f15fe2c\" width=\"100%\" global_colors_info=\"{}\"]<h1>usd-2021-0008 | VMware Workspace ONE<\/h1>\n<p><span><\/span><br \/><strong>Advisory ID<\/strong><span>: usd-2021-0008<\/span><br \/><strong>CVE Number<\/strong><span>: <\/span><a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-21990\" target=\"_blank\" rel=\"noopener\">CVE-2021-21990<\/a><br \/><strong>Affected Product<\/strong><span>: VMware Workspace ONE<\/span><br \/><strong>Vulnerability Type<\/strong><span>: CWE-79: Cross-site Scripting<\/span><br \/><strong>Security Risk<\/strong><span>: Low<\/span><br \/><strong>Vendor URL<\/strong><span>: <\/span><a href=\"https:\/\/www.vmware.com\/products\/workspace-one.html\" target=\"_blank\" rel=\"noopener\">https:\/\/www.vmware.com\/products\/workspace-one.html<\/a><br \/><strong>Vendor Status<\/strong><span>: Fixed<\/span><\/p>\n<h3><\/h3>\n<h3>Description<\/h3>\n<p>A <a href=\"https:\/\/web.archive.org\/web\/20211209082502\/https:\/\/api.na1.region.data.vmwservices.com\/DeviceManagement\/Enrollment\/IsMamEnrollmentEnabled\" target=\"_blank\" rel=\"noopener\">VMware endpoint<\/a> reflects user controlled contents without sanitization, resulting in limited reflected Cross-Site Scripting. The endpoint reflects the Referer HTTP header contents within an HTTP redirect\u2019s Location header without any sanitization. As it allows arbitrary domains, this enables an Open Redirect vulnerability. Further, as arbitrary schemes are allowed, using a data-URI as Referer leads to JavaScript execution in a victim\u2019s browser and under certain circumstances.<\/p>\n<p>Cross-Site Scripting vulnerabilities could arise if user controlled contents are reflected without sufficient and context-aware sanitization and\/or encoding. If a malicious actor is able to inject malicious JavaScript which is run within the context of an application and in a victim\u2019s browser and session, the malicious actor could potentially steal sensitive information or perform actions on behalf of the victim.<\/p>\n<p><span><\/span><\/p>\n<h3>Proof of Concept (PoC)<\/h3>\n<p>The following request response pairs illustrate how the vulnerability could be exploited.<\/p>\n<p>Please note that we redacted the exact subdomain of awmdm.com \u2013 our tests were performed against a generic AirWatch Hosted (SaaS) instance.<\/p>\n<p><strong>1. Open Redirect<\/strong><\/p>\n<p>Request:<\/p>[\/et_pb_text][et_pb_text _builder_version=\"4.16\" _module_preset=\"9e260d37-0be2-4a12-a10e-3ed7e27b6ac6\" custom_margin=\"20px||29px||false|false\" global_colors_info=\"{}\"]<p>GET \/DeviceManagement\/Enrollment\/IsMamEnrollmentEnabled?groupId=%3ca HTTP\/1.1<br \/>Host: abcdef.awmdm.com<br \/>Referer: https:\/\/www.usd.de\/<\/p>[\/et_pb_text][et_pb_text _builder_version=\"4.17.1\" _module_preset=\"cc5ac6f4-ebbd-4b3f-bc92-4dfc1f15fe2c\" global_colors_info=\"{}\"]<p>\u00a0Response:<\/p>[\/et_pb_text][et_pb_text _builder_version=\"4.16\" _module_preset=\"9e260d37-0be2-4a12-a10e-3ed7e27b6ac6\" custom_margin=\"20px||29px||false|false\" global_colors_info=\"{}\"]<p>HTTP\/1.1 302 Found<br \/>Cache-Control: private<br \/>Content-Type: text\/html; charset=utf-8<br \/>Location: https:\/\/www.usd.de\/<br \/>[\u2026]<br \/>&lt;h2&gt;Object moved to &lt;a href=\u201chttps:\/\/www.usd.de\/\u201c&gt;here&lt;\/a&gt;.&lt;\/h2&gt;<\/p>[\/et_pb_text][et_pb_text _builder_version=\"4.17.1\" _module_preset=\"cc5ac6f4-ebbd-4b3f-bc92-4dfc1f15fe2c\" custom_margin=\"||27px||false|false\" global_colors_info=\"{}\"]<p><strong>2. Limited XSS<\/strong><\/p>\n<p>Request:<\/p>[\/et_pb_text][et_pb_text _builder_version=\"4.16\" _module_preset=\"9e260d37-0be2-4a12-a10e-3ed7e27b6ac6\" custom_margin=\"20px||29px||false|false\" global_colors_info=\"{}\"]<p>GET \/DeviceManagement\/Enrollment\/IsMamEnrollmentEnabled?groupId=%3ca HTTP\/1.1<br \/>Host: abcdef.awmdm.com<br \/>Referer: data:text\/html,alert(1)<\/p>[\/et_pb_text][et_pb_text _builder_version=\"4.17.1\" _module_preset=\"cc5ac6f4-ebbd-4b3f-bc92-4dfc1f15fe2c\" custom_margin=\"||27px||false|false\" global_colors_info=\"{}\"]<p>\u00a0Response:<\/p>[\/et_pb_text][et_pb_text _builder_version=\"4.17.1\" _module_preset=\"9e260d37-0be2-4a12-a10e-3ed7e27b6ac6\" custom_margin=\"20px||29px||false|false\" global_colors_info=\"{}\"]<p>HTTP\/1.1 302 Found<br \/>Cache-Control: private<br \/>Content-Type: text\/html; charset=utf-8<br \/>Location: data:text\/html,%3Cscript%3Ealert(1)%3C\/script%3E<br \/>[\u2026]<br \/>&lt;h2&gt;Object moved to &lt;a&gt;here&lt;\/a&gt;.&lt;\/h2&gt;<\/p>[\/et_pb_text][et_pb_text _builder_version=\"4.16\" _module_preset=\"cc5ac6f4-ebbd-4b3f-bc92-4dfc1f15fe2c\" custom_margin=\"||27px||false|false\" global_colors_info=\"{}\"]<div class=\"x-text\">\n<p>Safari on iOS renders HTML and evaluates embedded JavaScript if it is encountered as <em>data<\/em>-URI within a <em>Location<\/em> header:<\/p>\n<\/div>[\/et_pb_text][et_pb_image src=\"https:\/\/herolab.usd.de\/wp-content\/uploads\/sites\/9\/2021\/07\/vmware_limited_xss_ios-169x300-1.jpg\" title_text=\"vmware_limited_xss_ios-169x300\" _builder_version=\"4.16\" _module_preset=\"default\" custom_margin=\"27px||43px||false|false\" global_colors_info=\"{}\"][\/et_pb_image][et_pb_text _builder_version=\"4.16\" _module_preset=\"cc5ac6f4-ebbd-4b3f-bc92-4dfc1f15fe2c\" global_colors_info=\"{}\"]<div class=\"e16902-22 x-container max width\">\n<div class=\"e16902-23 x-column x-sm x-1-1\">\n<h3>Fix<\/h3>\n<p><span>It is recommended to consider all user input to the application as potentially malicious. All input to the application should be verified and if necessary replaced. Meta characters should be treated with care. The majority of programming languages supports standard procedures for filtering and replacing meta characters. For example, PHP has the built-in function <\/span><em>htmlspecialchars()<\/em><span>. It is recommended to use whitelisting wherever possible.<\/span><\/p>\n<h3><\/h3>\n<h3>Timeline<\/h3>\n<ul>\n<li>2021-03-12: This vulnerability was identified by Leif Enders and Lauritz Holtmann.<\/li>\n<li>2021-03-14: Advisory submitted to vendor via e-mail.<\/li>\n<li>2021-04-08: Vendor informs about upcoming fix.<\/li>\n<li>2021-05-11: Advisory for CVE-2021-21990 is released by VMware: <a href=\"https:\/\/www.vmware.com\/security\/advisories\/VMSA-2021-0008.html\" target=\"_blank\" rel=\"noopener\">https:\/\/www.vmware.com\/security\/advisories\/VMSA-2021-0008.html<\/a><\/li>\n<li>2021-05-31: Security advisory released by usd AG.<\/li>\n<\/ul>\n<h3><\/h3>\n<h3>Credits<\/h3>\n<p><span>This security vulnerability was found by Leif Enders and Lauritz Holtmann of usd AG.<\/span><\/p>\n<\/div>\n<\/div>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]\n","protected":false},"excerpt":{"rendered":"<p>usd-2021-0008 | VMware Workspace ONE Advisory ID: usd-2021-0008CVE Number: CVE-2021-21990Affected Product: VMware Workspace ONEVulnerability Type: CWE-79: Cross-site ScriptingSecurity Risk: LowVendor URL: https:\/\/www.vmware.com\/products\/workspace-one.htmlVendor Status: Fixed Description A VMware endpoint reflects user controlled contents without sanitization, resulting in limited reflected Cross-Site Scripting. The endpoint reflects the Referer HTTP header contents within an HTTP redirect\u2019s Location header without [&hellip;]<\/p>\n","protected":false},"author":96,"featured_media":0,"parent":16124,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"class_list":["post-16717","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages\/16717","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/users\/96"}],"replies":[{"embeddable":true,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/comments?post=16717"}],"version-history":[{"count":0,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages\/16717\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages\/16124"}],"wp:attachment":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/media?parent=16717"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}