TippingPoint Zero Day Initiative

EMC VMAX3 VASA Provider UploadConfigurator Unrestricted File Upload Remote Code Execution Vulnerability

ZDI-17-491: July 19th, 2017


CVSS Score

Affected Vendors

Affected Products

    VMAX3 VASA Provider

Vulnerability Details

This vulnerability allows remote attackers to create arbitrary files on vulnerable installations of EMC VMAX3 VASA Provider. Authentication is not required to exploit this vulnerability.

The specific flaw exists within the UploadConfigurator servlet, which listens on TCP port 5480 by default. The issue results from the web service serving files that have been uploaded by a user. An attacker can leverage this vulnerability to execute arbitrary code under the context of root.

Vendor Response

EMC has issued an update to correct this vulnerability. More details can be found at:

Disclosure Timeline

    2017-04-05 - Vulnerability reported to vendor
    2017-07-19 - Coordinated public release of advisory


This vulnerability was discovered by: