SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   VMware vSphere Vendors:   VMware
VMware vSphere Client XML External Entity Processing Flaw Lets Remote Users Obtain Potentially Sensitive Information
SecurityTracker Alert ID:  1037328
SecurityTracker URL:  http://securitytracker.com/id/1037328
CVE Reference:   CVE-2016-7458   (Links to External Site)
Date:  Nov 23 2016
Impact:   Disclosure of system information, Disclosure of user information
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): Client 5.5, 6.0
Description:   A vulnerability was reported in VMware vSphere Client. A remote user can conduct XML external entity attacks to obtain potentially sensitive information on the target system.

A remote vCenter Server or ESXi system can return specially crafted XML External Entity (XXE) data to the target vSphere Client to obtain potentially sensitive information from the target system.

Vladimir Ivanov, Andrey Evlanin, Mikhail Stepankin, Artem Kondratenko, and Arseniy Sharoglazov of Positive Technologies reported this vulnerability.

Impact:   A remote user can obtain potentially sensitive information on the target system.
Solution:   The vendor has issued a fix (5.5 U3e, 6.0 U2a).

The vendor advisory is available at:

http://www.vmware.com/security/advisories/VMSA-2016-0022.html

Vendor URL:  www.vmware.com/security/advisories/VMSA-2016-0022.html (Links to External Site)
Cause:   Not specified

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC