|Title||VMware ESXi updates address a cross-site scripting issue|
|Name||VMSA-2016-0023||First vendor Publication||2016-12-20|
|Vendor||VMware||Last vendor Modification||2016-12-20|
Security-Database Scoring CVSS v2
|Cvss vector : (AV:N/AC:M/Au:S/C:N/I:P/A:N)|
|Cvss Base Score||3.5||Attack Range||Network|
|Cvss Impact Score||2.9||Attack Complexity||Medium|
|Cvss Expoit Score||6.8||Authentication||Requires single instance|
|Calculate full CVSS 2.0 Vectors scores|
a. Host Client stored cross-site scripting issue
The ESXi Host Client contains a vulnerability that may allow for stored cross-site scripting (XSS). The issue can be introduced by an attacker that has permission to manage virtual machines through ESXi Host Client or by tricking the vSphere administrator to import a specially crafted VM. The issue may be triggered on the system from where ESXi Host Client is used to manage the specially crafted VM.
VMware advises not to import VMs from untrusted sources.
VMware would like to thank Caleb Watt (@calebwatt15) for reporting this issue to us.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2016-7463 to this issue.
|Url : http://www.vmware.com/security/advisories/VMSA-2016-0023.html|
CWE : Common Weakness Enumeration
|100 %||CWE-79||Failure to Preserve Web Page Structure ('Cross-site Scripting') (CWE/SANS Top 25)|
CPE : Common Platform Enumeration
Nessus® Vulnerability Scanner
|2016-12-22||Name : The remote VMware ESXi host is missing a security-related patch.|
File : vmware_VMSA-2016-0023.nasl - Type : ACT_GATHER_INFO