VMSA-2016-0023 : VMware ESXi updates address a cross-site scripting issue

This script is Copyright (C) 2016-2017 Tenable Network Security, Inc.


Synopsis :

The remote VMware ESXi host is missing a security-related patch.

Description :

a. Host Client stored cross-site scripting issue

The ESXi Host Client contains a vulnerability that may allow for
stored cross-site scripting (XSS). The issue can be introduced by
an attacker that has permission to manage virtual machines through
ESXi Host Client or by tricking the vSphere administrator to import
a specially crafted VM. The issue may be triggered on the system
from where ESXi Host Client is used to manage the specially crafted
VM.

VMware advises not to import VMs from untrusted sources.

VMware would like to thank Caleb Watt (@calebwatt15) for reporting
this issue to us.

The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the identifier CVE-2016-7463 to this issue.

See also :

http://lists.vmware.com/pipermail/security-announce/2016/000361.html

Solution :

Apply the missing patch.

Risk factor :

Low / CVSS Base Score : 3.5
(CVSS2#AV:N/AC:M/Au:S/C:N/I:P/A:N)
CVSS Temporal Score : 2.9
(CVSS2#E:F/RL:OF/RC:ND)
Public Exploit Available : true

Family: VMware ESX Local Security Checks

Nessus Plugin ID: 96084 ()

Bugtraq ID:

CVE ID: CVE-2016-7463

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now