VMware vCenter Server 5.5.x < 5.5u3d / 6.0.x < 6.0u2 Client Integration Plugin Session Hijacking (VMSA-2016-0004)

Medium Nessus Plugin ID 90710


A virtualization management application installed on the remote host is affected by a session hijacking vulnerability.


The version of VMware vCenter Server installed on the remote host is 5.5.x prior to 5.5u3d or 6.0.x prior to 6.0u2. It is, therefore, affected by a flaw in the VMware Client Integration Plugin due to a failure to handle session content in a secure manner. A remote attacker can exploit this, by convincing a user to visit a malicious web page, to conduct a session hijacking attack. It can also be exploited to carry out a man-in-the-middle attack.


Upgrade to VMware vCenter Server version 5.5u3d (5.5.0 build-3721164) / 6.0u2 (6.0.0 build-3634788) or later.

See Also


Plugin Details

Severity: Medium

ID: 90710

File Name: vmware_vcenter_vmsa-2016-0004.nasl

Version: $Revision: 1.6 $

Type: remote

Family: Misc.

Published: 2016/04/26

Modified: 2016/12/05

Dependencies: 63061

Risk Information

Risk Factor: Medium


Base Score: 5.8

Temporal Score: 4.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:vmware:vcenter_server

Required KB Items: Host/VMware/vCenter, Host/VMware/version, Host/VMware/release

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2016/04/14

Vulnerability Publication Date: 2016/04/14

Reference Information

CVE: CVE-2016-2076

OSVDB: 137167

VMSA: 2016-0004