<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>VMware &#8211; ChaBug安全</title>
	<atom:link href="/tags/vmware/feed" rel="self" type="application/rss+xml" />
	<link>/</link>
	<description>一个分享知识、结识伙伴、资源共享的博客</description>
	<lastBuildDate>Wed, 14 Oct 2020 01:09:08 +0000</lastBuildDate>
	<language>zh-CN</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=5.5.5</generator>
	<item>
		<title>VMware vCenter未授权任意文件读取</title>
		<link>/web/1999.html</link>
		
		<dc:creator><![CDATA[Y4er]]></dc:creator>
		<pubDate>Wed, 14 Oct 2020 01:09:08 +0000</pubDate>
				<category><![CDATA[渗透测试]]></category>
		<category><![CDATA[VMware]]></category>
		<category><![CDATA[文件读取]]></category>
		<guid isPermaLink="false">/?p=1999</guid>

					<description><![CDATA[我们在VMware vCenter中发现了一个未经身份验证的任意文件读取漏洞。 VMware透露此漏洞已在6.5u1中修复，但未分配CVE。 We found an Unauthe...]]></description>
										<content:encoded><![CDATA[<p>我们在<span class="wpcom_tag_link"><a href="/tags/vmware" title="VMware" target="_blank">VMware</a></span> vCenter中发现了一个未经身份验证的任意<span class="wpcom_tag_link"><a href="/tags/%e6%96%87%e4%bb%b6%e8%af%bb%e5%8f%96" title="文件读取" target="_blank">文件读取</a></span>漏洞。 VMware透露此漏洞已在6.5u1中修复，但未分配CVE。<br />
<a class="wp-editor-md-post-content-link" href="https://i.loli.net/2020/10/14/YNdJ5ZegzbRrWoh.jpg"><img src="https://i.loli.net/2020/10/14/YNdJ5ZegzbRrWoh.jpg" alt="" /></a></p>
<blockquote class="twitter-tweet" data-width="500" data-dnt="true">
<p lang="en" dir="ltr">We found an Unauthenticated Arbitrary File Read vulnerability in VMware vCenter. VMware revealed that this vulnerability was patched in 6.5u1, but no CVE was assigned.</p>
<p>The PoC ⬇️ <a href="https://t.co/LfvbyBUhF5">pic.twitter.com/LfvbyBUhF5</a></p>
<p>&mdash; PT SWARM (@ptswarm) <a href="https://twitter.com/ptswarm/status/1316016337550938122?ref_src=twsrc%5Etfw">October 13, 2020</a></p></blockquote>
<p><script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script></p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
