VMware vCenter Server 5.5.x < 5.5u3d / 6.0.x < 6.0u2 Client Integration Plugin Session Hijacking (VMSA-2016-0004)

high Nessus Plugin ID 90710

Synopsis

A virtualization management application installed on the remote host is affected by a session hijacking vulnerability.

Description

The version of VMware vCenter Server installed on the remote host is 5.5.x prior to 5.5u3d or 6.0.x prior to 6.0u2. It is, therefore, affected by a flaw in the VMware Client Integration Plugin due to a failure to handle session content in a secure manner. A remote attacker can exploit this, by convincing a user to visit a malicious web page, to conduct a session hijacking attack. It can also be exploited to carry out a man-in-the-middle attack.

Solution

Upgrade to VMware vCenter Server version 5.5u3d (5.5.0 build-3721164) / 6.0u2 (6.0.0 build-3634788) or later.

See Also

https://www.vmware.com/security/advisories/VMSA-2016-0004.html

Plugin Details

Severity: High

ID: 90710

File Name: vmware_vcenter_vmsa-2016-0004.nasl

Version: 1.9

Type: remote

Family: Misc.

Published: 4/26/2016

Updated: 11/20/2019

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.7

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2016-2076

CVSS v3

Risk Factor: High

Base Score: 7.6

Temporal Score: 6.6

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:vmware:vcenter_server

Required KB Items: Host/VMware/release, Host/VMware/version, Host/VMware/vCenter

Exploit Ease: No known exploits are available

Patch Publication Date: 4/14/2016

Vulnerability Publication Date: 4/14/2016

Reference Information

CVE: CVE-2016-2076

VMSA: 2016-0004