SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   VMware vCenter Vendors:   VMware
VMware vCenter Server Header Injection Flaw Lets Remote Users Conduct Cross-Site Scripting and Redirect Attacks
SecurityTracker Alert ID:  1036543
SecurityTracker URL:  http://securitytracker.com/id/1036543
CVE Reference:   CVE-2016-5331   (Links to External Site)
Updated:  Aug 5 2016
Original Entry Date:  Aug 5 2016
Impact:   Disclosure of authentication information, Disclosure of user information, Execution of arbitrary code via network, Modification of system information
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 6.0
Description:   A vulnerability was reported in VMware vCenter Server. A remote user can conduct cross-site scripting and open redirect attacks.

The software does not properly validate user-supplied input. A remote user can set arbitrary HTTP response headers and cookies to conduct cross-site scripting and open redirect attacks.

Vladimir Ivanov, Andrey Evlanin, Mikhail Stepankin, Artem Kondratenko, Arseniy Sharoglazov of Positive Technologies, Matt Foster of Netcraft Ltd, Matthias Deeg of SySS GmbH, Eva Esteban Molina of A2secure, and Ammarit Thongthua independently reported this vulnerability.

Impact:   A remote user can conduct cross-site scripting and open redirect attacks.
Solution:   The vendor has issued a fix (6.0 U2).

The vendor advisory is available at:

http://www.vmware.com/security/advisories/VMSA-2016-0010.html

Vendor URL:  www.vmware.com/security/advisories/VMSA-2016-0010.html (Links to External Site)
Cause:   Input validation error

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC